{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T14:32:43Z","timestamp":1777818763761,"version":"3.51.4"},"reference-count":152,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2025,2,11]],"date-time":"2025-02-11T00:00:00Z","timestamp":1739232000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers"],"abstract":"<jats:p>With the proliferation of IoT-based applications, security requirements are becoming increasingly stringent. Given the diversity of such systems, selecting the most appropriate solutions and technologies to address the challenges is a complex activity. This paper provides an exhaustive evaluation of existing security challenges related to the IoT domain, analysing studies published between 2021 and 2025. This review explores the evolving landscape of IoT security, identifying key focus areas, challenges, and proposed solutions as presented in recent research. Through this analysis, the review categorizes IoT security efforts into six main areas: emerging technologies (35.2% of studies), securing identity management (19.3%), attack detection (17.9%), data management and protection (8.3%), communication and networking (13.8%), and risk management (5.5%). These percentages highlight the research community\u2019s focus and indicate areas requiring further investigation. From leveraging machine learning and blockchain for anomaly detection and real-time threat response to optimising lightweight algorithms for resource-limited devices, researchers propose innovative and adaptive solutions to address emerging threats. The review underscores the integration of advanced technologies to enhance IoT system security, while also highlighting ongoing challenges. The paper concludes with a synthesis of security challenges and threats of each identified category, along with their solutions, aiming to support decision-making during the design approach of IoT-based applications and to guide future research toward comprehensive and efficient IoT frameworks.<\/jats:p>","DOI":"10.3390\/computers14020061","type":"journal-article","created":{"date-parts":[[2025,2,12]],"date-time":"2025-02-12T08:05:42Z","timestamp":1739347542000},"page":"61","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["A Literature Review on Security in the Internet of Things: Identifying and Analysing Critical Categories"],"prefix":"10.3390","volume":"14","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-8580-2891","authenticated-orcid":false,"given":"Hannelore","family":"Sebestyen","sequence":"first","affiliation":[{"name":"Faculty of Automation and Computing, Politehnica University Timi\u0219oara, 300223 Timi\u015foara, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7804-5178","authenticated-orcid":false,"given":"Daniela Elena","family":"Popescu","sequence":"additional","affiliation":[{"name":"Computers and Information Technology Department, University of Oradea, 410087 Oradea, Romania"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3344-5714","authenticated-orcid":false,"given":"Rodica Doina","family":"Zmaranda","sequence":"additional","affiliation":[{"name":"Computers and Information Technology Department, University of Oradea, 410087 Oradea, Romania"}]}],"member":"1968","published-online":{"date-parts":[[2025,2,11]]},"reference":[{"key":"ref_1","unstructured":"Greengard, S. (2024). Internet of Things. Encyclopedia Britannica, Available online: https:\/\/www.britannica.com\/science\/Internet-of-Things."},{"key":"ref_2","unstructured":"Satyajit, S. (2024). State of IoT 2024: Number of Connected IoT Devices Growing 13% to 18.8 Billion Globally, IoT Analytics."},{"key":"ref_3","unstructured":"Greenberg, A. (2025, January 17). Hackers Remotely Kill a Jeep on the Highway\u2014With Me in It. Available online: https:\/\/www.wired.com\/2015\/07\/hackers-remotely-kill-jeep-highway\/."},{"key":"ref_4","unstructured":"Antonakakis, M., April, T., and Bailey, M. (2017, January 16). Understanding the Mirai Botnet. Proceedings of the 26th USENIX Security Symposium, Vancouver, BC, Canada."},{"key":"ref_5","unstructured":"Smart, W. (2018). Lessons Learned Review of the WannaCry Ransomware Cyber Attack, Department of Health and Social Care."},{"key":"ref_6","unstructured":"Brewster, T. (2025, January 17). Hackers Used a Fish Tank to Breach a Casino\u2019s High-Roller Database. Forbes, Available online: https:\/\/www.forbes.com\/sites\/thomasbrewster\/2018\/07\/19\/fish-tank-hack-into-casino\/."},{"key":"ref_7","unstructured":"Kari, P. (2025, January 17). Dozens Sue Amazon\u2019s Ring after Camera Hack Leads to Threats and Racial Slurs. The Guardian, 23 December 2020. Available online: https:\/\/www.theguardian.com\/technology\/2020\/dec\/23\/amazon-ring-camera-hack-lawsuit-threats."},{"key":"ref_8","unstructured":"Cimpanu, C. (2025, January 17). Garmin Services and Production Go Down After Ransomware Attack. Available online: https:\/\/www.zdnet.com\/article\/garmin-services-and-production-go-down-after-ransomware-attack\/."},{"key":"ref_9","unstructured":"Easterly, J. (2024, November 15). The Attack on Colonial Pipeline: What We\u2019ve Learned & What We\u2019ve Done Over the Past Two Years, Available online: https:\/\/www.cisa.gov\/news-events\/news\/attack-colonial-pipeline-what-weve-learned-what-weve-done-over-past-two-years."},{"key":"ref_10","unstructured":"Montalbano, E. (2025, January 17). Breach Exposes Verkada Security Camera Footage at Tesla, Cloudflare. Threatpost 10 March 2021. Available online: https:\/\/threatpost.com\/breach-verkada-security-camera-tesla-cloudflare\/164635\/."},{"key":"ref_11","unstructured":"Gartenberg, C. (2024, November 15). Security Startup Verkada Hack Exposes 150,000 Security Cameras in Tesla Factories, Jails, and More. Available online: https:\/\/www.theverge.com\/2021\/3\/9\/22322122\/verkada-hack-150000-security-cameras-tesla-factory-cloudflare-jails-hospitals."},{"key":"ref_12","unstructured":"Greenberg, A. (2025, January 17). A Hacker Tried to Poison a Florida City\u2019s Water Supply, Officials Say. Available online: https:\/\/www.wired.com\/story\/oldsmar-florida-water-utility-hack\/."},{"key":"ref_13","unstructured":"Kapko, M. (2025, January 17). MOVEit Liabilities Mount for Progress Software. Cybersecurity Dive. Available online: https:\/\/www.cybersecuritydive.com\/news\/moveit-liabilities-progress\/706015\/."},{"key":"ref_14","unstructured":"Ptrosyan, A. (2025, January 17). Annual Number of Internet of Things (IoT) Malware Attacks Worldwide from 2018 to 2022. Statista, Cyber Crime & Security. Available online: https:\/\/www.statista.com\/statistics\/1377569\/worldwide-annual-internet-of-things-attacks\/."},{"key":"ref_15","unstructured":"(2016). Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation). Off. J. Eur. Union, L119, 1\u201388."},{"key":"ref_16","unstructured":"(2025, January 17). H.R.1668\u2014IoT Cybersecurity Improvement Act of 2020, Available online: https:\/\/www.congress.gov\/bill\/116th-congress\/house-bill\/1668."},{"key":"ref_17","unstructured":"(2025, February 01). AT&T, IBM, Nokia, Palo Alto Networks, Symantec and Trustonic Form IoT Cybersecurity Alliance. Available online: https:\/\/about.att.com\/story\/iot_cybersecurity_alliance.html."},{"key":"ref_18","unstructured":"Caindec, K., Buchheit, M., Zarkout, B., Schrecker, S., Hirsch, F., Dungana, I., Martin, R., and Tseng, M. (2017). An Industry IoT Foundational Publication, AT&T Inc."},{"key":"ref_19","unstructured":"(2024, November 15). CoAP RFC 7252 Constrained Application Protocol. Available online: https:\/\/datatracker.ietf.org\/doc\/html\/rfc7252."},{"key":"ref_20","unstructured":"(2024). Internet of Things (IoT)\u2014Reference Architecture (Standard No. ISO\/IEC 30141:2024)."},{"key":"ref_21","unstructured":"(2020). European StandardCyber Security for Consumer Internet of Things: Baseline Requirements. (Standard No. ETSI EN 303 645). Available online: https:\/\/www.etsi.org\/deliver\/etsi_en\/303600_303699\/303645\/02.01.01_60\/en_303645v020101p.pdf."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Dritsas, E., and Trigka, M. (2025). A Survey on Cybersecurity in IoT. Future Internet, 17.","DOI":"10.3390\/fi17010030"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Szymoniak, S., Pi\u0105tkowski, J., and Kurkowski, M. (2025). Defense and Security Mechanisms in the Internet of Things: A Review. Appl. Sci., 15.","DOI":"10.3390\/app15020499"},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Singh, N., Buyya, R., and Kim, H. (2024). Securing Cloud-Based Internet of Things: Challenges and Mitigations. Sensors, 25.","DOI":"10.3390\/s25010079"},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Krzyszto\u0144, E., Rojek, I., and Miko\u0142ajewski, D. (2024). A Comparative Analysis of Anomaly Detection Methods in IoT Networks: An Experimental Study. Appl. Sci., 14.","DOI":"10.3390\/app142411545"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Alshamsi, O., Shaalan, K., and Butt, U. (2024). Towards Securing Smart Homes: A Systematic Literature Review of Malware Detection Techniques and Recommended Prevention Approach. Information, 15.","DOI":"10.3390\/info15100631"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Fatima, M., Rehman, O., Rahman, I.M.H., Ajmal, A., and Park, S.J. (2024). Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices. Future Internet, 16.","DOI":"10.3390\/fi16100368"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Kikissagbe, B.R., and Adda, M. (2024). Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review. Electronics, 13.","DOI":"10.3390\/electronics13183601"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Dritsas, E., and Trigka, M. (2024). Machine Learning for Blockchain and IoT Systems in Smart Cities: A Survey. Future Internet, 16.","DOI":"10.3390\/fi16090324"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Roy, S., Sankaran, S., and Zeng, M. (2024). Green Intrusion Detection Systems: A Comprehensive Review and Directions. Sensors, 24.","DOI":"10.3390\/s24175516"},{"key":"ref_31","doi-asserted-by":"crossref","unstructured":"Alkhayyal, M., and Mostafa, A. (2024). Recent Developments in AI and ML for IoT: A Systematic Literature Review on LoRaWAN Energy Efficiency and Performance Optimization. Sensors, 24.","DOI":"10.3390\/s24144482"},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Isong, B., Kgote, O., and Abu-Mahfouz, A. (2024). Insights into Modern Intrusion Detection Strategies for Internet of Things Ecosystems. Electronics, 13.","DOI":"10.3390\/electronics13122370"},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Gelgi, M., Guan, Y., Arunachala, S., Samba Siva Rao, M., and Dragoni, N. (2024). Systematic Literature Review of IoT Botnet DDOS Attacks and Evaluation of Detection Techniques. Sensors, 24.","DOI":"10.3390\/s24113571"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Rafique, S.H., Abdallah, A., Musa, N.S., and Murugan, T. (2024). Machine Learning and Deep Learning Techniques for Internet of Things Network Anomaly Detection\u2014Current Research Trends. Sensors, 24.","DOI":"10.3390\/s24061968"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Bukhowah, R., Aljughaiman, A., and Rahman, M.M.H. (2024). Detection of DoS Attacks for IoT in Information-Centric Networks Using Machine Learning: Opportunities, Challenges, and Future Research Directions. Electronics, 13.","DOI":"10.3390\/electronics13061031"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Alhamarneh, R.A., and Mahinderjit Singh, M. (2024). Strengthening Internet of Things Security: Surveying Physical Unclonable Functions for Authentication, Communication Protocols, Challenges, and Applications. Appl. Sci., 14.","DOI":"10.3390\/app14051700"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Hossain, M., Kayas, G., Hasan, R., Skjellum, A., Noor, S., and Islam, S.M.R. (2024). A Holistic Analysis of Internet of Things (IoT) Security: Principles, Practices, and New Perspectives. Future Internet, 16.","DOI":"10.3390\/fi16020040"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"AlSalem, T., Almaiah, M., and Lutfi, A. (2023). Cybersecurity Risk Analysis in the IoT: A Systematic Review. Electronics, 12.","DOI":"10.3390\/electronics12183958"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"Alotaibi, B. (2023). A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. Sensors, 23.","DOI":"10.20944\/preprints202307.0771.v1"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Alahmadi, A.A., Aljabri, M., Alhaidari, F., Alharthi, D.J., Rayani, G.E., Marghalani, L.A., Alotaibi, O.B., and Bajandouh, S.A. (2023). DDoS Attack Detection in IoT-Based Networks Using Machine Learning Models: A Survey and Research Directions. Electronics, 12.","DOI":"10.3390\/electronics12143103"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Chui, K.T., Gupta, B.B., Liu, J., Arya, V., Nedjah, N., Almomani, A., and Chaurasia, P. (2023). A Survey of Internet of Things and Cyber-Physical Systems: Standards, Algorithms, Applications, Security, Challenges, and Future Directions. Information, 14.","DOI":"10.3390\/info14070388"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Pritika, P., Shanmugam, B., and Azam, S. (2023). Risk Assessment of Heterogeneous IoMT Devices: A Review. Technologies, 11.","DOI":"10.3390\/technologies11010031"},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Aslan, \u00d6., Aktu\u011f, S.S., Ozkan-Okay, M., Yilmaz, A.A., and Akin, E. (2023). A Comprehensive Review of Cyber Security Vulnerabilities, Threats, Attacks, and Solutions. Electronics, 12.","DOI":"10.3390\/electronics12061333"},{"key":"ref_44","doi-asserted-by":"crossref","unstructured":"Taherdoost, H. (2023). Security and Internet of Things: Benefits, Challenges, and Future Perspectives. Electronics, 12.","DOI":"10.3390\/electronics12081901"},{"key":"ref_45","doi-asserted-by":"crossref","unstructured":"Tariq, U., Ahmed, I., Bashir, A.K., and Shaukat, K. (2023). A Critical Cybersecurity Analysis and Future Research Directions for the Internet of Things: A Comprehensive Review. Sensors, 23.","DOI":"10.3390\/s23084117"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"104097","DOI":"10.1016\/j.cose.2024.104097","article-title":"A Survey on Privacy and Security Issues in IoT-Based Environments: Technologies, Protection Measures and Future Directions","volume":"148","author":"Sun","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_47","first-page":"31","article-title":"A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices","volume":"78","author":"Kumar","year":"2024","journal-title":"Comput. Mater. Contin."},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"100158","DOI":"10.1016\/j.prime.2023.100158","article-title":"A Comprehensive Study on Issues and Challenges Related to Privacy and Security in IoT","volume":"4","author":"Chaurasia","year":"2023","journal-title":"e-Prime\u2014Adv. Electr. Eng. Electron. Energy"},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"101478","DOI":"10.1016\/j.iot.2024.101478","article-title":"A Cybersecurity Review in IoT 5G Networks","volume":"30","author":"Benavides","year":"2025","journal-title":"Internet Things"},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"100631","DOI":"10.1016\/j.cosrev.2024.100631","article-title":"AI Techniques for IoT-Based DDoS Attack Detection: Taxonomies, Comprehensive Review and Research Challenges","volume":"52","author":"Bala","year":"2024","journal-title":"Comput. Sci. Rev."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"103096","DOI":"10.1016\/j.cose.2023.103096","article-title":"A Comprehensive Study of DDoS Attacks over IoT Network and Their Countermeasures","volume":"127","author":"Kumari","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"103384","DOI":"10.1016\/j.cose.2023.103384","article-title":"Detecting Compromised IoT Devices: Existing Techniques, Challenges, and a Way Forward","volume":"132","author":"Makhdoom","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_53","unstructured":"(2024, December 03). Unpacking IoT Architecture: Layers and Components Explained. Available online: https:\/\/deviceauthority.com\/unpacking-iot-architecture-layers-and-components-explained\/."},{"key":"ref_54","doi-asserted-by":"crossref","first-page":"100626","DOI":"10.1016\/j.iot.2022.100626","article-title":"An Overview of IoT Architectures, Technologies, and Existing Open-Source Projects","volume":"20","author":"Campos","year":"2022","journal-title":"Internet Things"},{"key":"ref_55","unstructured":"Rai, S. (2025, January 18). How to Greatly Improve Battery Power Efficiency for IoT Devices, Analog Devices, Technical Articles, March 6 2023. Available online: https:\/\/www.analog.com\/en\/resources\/technical-articles\/greatly-improve-battery-power-efficiency-for-iot-devices.html."},{"key":"ref_56","unstructured":"Borres, B., and Tenorio, N. (2025, February 01). How Integrated On\/Off Controllers Contribute to Energy Efficient System Designs. Available online: https:\/\/www.analog.com\/en\/resources\/analog-dialogue\/articles\/integrated-on-off-controllers-contribute-to-energy-eff.html."},{"key":"ref_57","unstructured":"Rottleuthner, M., Schmidt, T.C., and W\u00e4hlisch, M. (2021). Dynamic Clock Reconfiguration for the Constrained IoT and Its Application to Energy-Efficient Networking. arXiv."},{"key":"ref_58","unstructured":"Tkhir, P. (2025, January 18). 4 Types of IoT Networks: Overview and Use Cases. Available online: https:\/\/euristiq.com\/types-of-iot-networks\/."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Alabsi, B., Anbar, M., and Rihan, S. (2023). Conditional Tabular Generative Adversarial Based Intrusion Detection System for Detecting Ddos and Dos Attacks on the Internet of Things Networks. Sensors, 23.","DOI":"10.3390\/s23125644"},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"59353","DOI":"10.1109\/ACCESS.2021.3073408","article-title":"Internet of Things Applications, Security Challenges, Attacks, Intrusion Detection, and Future Visions: A Systematic Review","volume":"9","author":"Mishra","year":"2021","journal-title":"IEEE Access"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Garg, U., Kumar, S., and Mahanti, A. (2024). IMTIBOT: An Intelligent Mitigation Technique for IoT Botnets. Future Internet, 16.","DOI":"10.3390\/fi16060212"},{"key":"ref_62","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1145\/3530812","article-title":"Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats","volume":"55","author":"Chen","year":"2023","journal-title":"ACM Comput. Surv."},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Woodiss-Field, A., Johnstone, M.N., and Haskell-Dowland, P. (2024). Examination of Traditional Botnet Detection on IoT-Based Bots. Sensors, 24.","DOI":"10.3390\/s24031027"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Beshah, Y.K., Abebe, S.L., and Melaku, H.M. (2024). Drift Adaptive Online DDoS Attack Detection Framework for IoT System. Electronics, 13.","DOI":"10.3390\/electronics13061004"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Altulaihan, E., Almaiah, M.A., and Aljughaiman, A. (2024). Anomaly Detection IDS for Detecting DoS Attacks in IoT Networks Based on Machine Learning Algorithms. Sensors, 24.","DOI":"10.3390\/s24020713"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Farraj, A., and Hammad, E. (2024). A Physical-Layer Security Cooperative Framework for Mitigating Interference and Eavesdropping Attacks in Internet of Things Environments. Sensors, 24.","DOI":"10.3390\/s24165171"},{"key":"ref_67","doi-asserted-by":"crossref","first-page":"119","DOI":"10.1186\/s13634-023-01080-5","article-title":"Active Eavesdropping Detection: A Novel Physical Layer Security in Wireless IoT","volume":"2023","author":"Li","year":"2023","journal-title":"EURASIP J. Adv. Signal Process."},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Kim, M., and Suh, T. (2021). Eavesdropping Vulnerability and Countermeasure in Infrared Communication for IoT Devices. Sensors, 21.","DOI":"10.3390\/s21248207"},{"key":"ref_69","doi-asserted-by":"crossref","unstructured":"Moubayed, A. (2024). A Complete EDA and DL Pipeline for Softwarized 5G Network Intrusion Detection. Future Internet, 16.","DOI":"10.3390\/fi16090331"},{"key":"ref_70","doi-asserted-by":"crossref","unstructured":"Kilichev, D., Turimov, D., and Kim, W. (2024). Next\u2013Generation Intrusion Detection for IoT EVCS: Integrating CNN, LSTM, and GRU Models. Mathematics, 12.","DOI":"10.3390\/math12040571"},{"key":"ref_71","doi-asserted-by":"crossref","unstructured":"Abdelhamid, S., Hegazy, I., Aref, M., and Roushdy, M. (2024). Attention-Driven Transfer Learning Model for Improved IoT Intrusion Detection. BDCC, 8.","DOI":"10.3390\/bdcc8090116"},{"key":"ref_72","doi-asserted-by":"crossref","unstructured":"Chen, J., Xiao, J., and Xu, J. (2024). VGGIncepNet: Enhancing Network Intrusion Detection and Network Security through Non-Image-to-Image Conversion and Deep Learning. Electronics, 13.","DOI":"10.3390\/electronics13183639"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Hu, L., Zhao, B., and Wang, G. (2024). A Network Device Identification Method Based on Packet Temporal Features and Machine Learning. Appl. Sci., 14.","DOI":"10.3390\/app14177954"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Aroon, N., Liu, V., Kane, L., Li, Y., Tesfamicael, A.D., and McKague, M. (2024). An Architecture of Enhanced Profiling Assurance for IoT Networks. Electronics, 13.","DOI":"10.3390\/electronics13142832"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"105669","DOI":"10.1016\/j.engappai.2022.105669","article-title":"Imbalanced Tabular Data Modelization Using CTGAN and Machine Learning to Improve IoT Botnet Attacks Detection","volume":"118","author":"Habibi","year":"2023","journal-title":"Eng. Appl. Artif. Intell."},{"key":"ref_76","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1016\/j.comcom.2022.06.039","article-title":"BotStop: Packet-Based Efficient and Explainable IoT Botnet Detection Using Machine Learning","volume":"193","author":"Alani","year":"2022","journal-title":"Comput. Commun."},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"de Caldas Filho, F.L., Soares, S.C.M., Oroski, E., de Oliveira Albuquerque, R., da Mata, R.Z.A., de Mendon\u00e7a, F.L.L., and de Sousa J\u00fanior, R.T. (2023). Botnet Detection and Mitigation Model for IoT Networks Using Federated Learning. Sensors, 23.","DOI":"10.3390\/s23146305"},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Negera, W.G., Schwenker, F., Debelee, T.G., Melaku, H.M., and Feyisa, D.W. (2023). Lightweight Model for Botnet Attack Detection in Software Defined Network-Orchestrated IoT. Appl. Sci., 13.","DOI":"10.3390\/app13084699"},{"key":"ref_79","doi-asserted-by":"crossref","first-page":"11888","DOI":"10.1109\/JIOT.2023.3244810","article-title":"Attack Classification of Imbalanced Intrusion Data for IoT Network Using Ensemble-Learning-Based Deep Neural Network","volume":"10","author":"Thakkar","year":"2023","journal-title":"IEEE Internet Things J."},{"key":"ref_80","doi-asserted-by":"crossref","unstructured":"Yang, C., Guan, W., and Fang, Z. (2023). IoT Botnet Attack Detection Model Based on DBO-Catboost. Appl. Sci., 13.","DOI":"10.3390\/app13127169"},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Hossain, M.A., and Islam, M.S. (2023). A Novel Hybrid Feature Selection and Ensemble-Based Machine Learning Approach for Botnet Detection. Sci. Rep., 13.","DOI":"10.1038\/s41598-023-48230-1"},{"key":"ref_82","doi-asserted-by":"crossref","first-page":"2935","DOI":"10.1109\/JIOT.2023.3294259","article-title":"A Lightweight and Efficient IoT Intrusion Detection Method Based on Feature Grouping","volume":"11","author":"He","year":"2024","journal-title":"IEEE Internet Things J."},{"key":"ref_83","doi-asserted-by":"crossref","unstructured":"Awajan, A. (2023). A Novel Deep Learning-Based Intrusion Detection System for IoT Networks. Computers, 12.","DOI":"10.3390\/computers12020034"},{"key":"ref_84","doi-asserted-by":"crossref","first-page":"20","DOI":"10.3390\/iot5010002","article-title":"Enhancing IoT Data Security: Using the Blockchain to Boost Data Integrity and Privacy","volume":"5","author":"Eghmazi","year":"2024","journal-title":"IoT"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Khan, B.U.I., Goh, K.W., Khan, A.R., Zuhairi, M.F., and Chaimanee, M. (2024). Integrating AI and Blockchain for Enhanced Data Security in IoT-Driven Smart Cities. Processes, 12.","DOI":"10.3390\/pr12091825"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"902","DOI":"10.1016\/j.future.2019.09.028","article-title":"Blockchain Data-Based Cloud Data Integrity Protection Mechanism","volume":"102","author":"Wei","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"101111","DOI":"10.1016\/j.iot.2024.101111","article-title":"A Systematic State-of-Art Review on Digital Identity Challenges with Solutions Using Conjugation of IOT and Blockchain in Healthcare","volume":"25","author":"Jena","year":"2024","journal-title":"Internet Things"},{"key":"ref_88","doi-asserted-by":"crossref","unstructured":"Song, Z., Yan, E., Song, J., Jiang, R., Yu, Y., and Chen, T. (2024). A Blockchain-Based Digital Identity System with Privacy, Controllability, and Auditability. Arab. J. Sci. Eng.","DOI":"10.1007\/s13369-024-09178-0"},{"key":"ref_89","doi-asserted-by":"crossref","first-page":"62","DOI":"10.1109\/IOTM.001.2400004","article-title":"Security Risks Concerns of Generative AI in the IoT","volume":"7","author":"Xu","year":"2024","journal-title":"IEEE Internet Things Mag."},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Wang, X., Wan, Z., Hekmati, A., Zong, M., Alam, S., Zhang, M., and Krishnamachari, B. (2024). IoT in the Era of Generative AI: Vision and Challenges. arXiv.","DOI":"10.1109\/MIC.2024.3443169"},{"key":"ref_91","first-page":"102031","article-title":"Blockchain User Digital Identity Big Data and Information Security Process Protection Based on Network Trust","volume":"36","author":"Wang","year":"2024","journal-title":"J. King Saud. Univ.\u2014Comput. Inf. Sci."},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Yang, Z., Liu, Y., Jin, X., Luo, X., Xu, Y., Li, M., Chen, P., Tang, B., and Lin, B. (2024). BDIDA-IoT: A Blockchain-Based Decentralized Identity Architecture Enhances the Efficiency of IoT Data Flow. Appl. Sci., 14.","DOI":"10.3390\/app14051807"},{"key":"ref_93","doi-asserted-by":"crossref","first-page":"56401","DOI":"10.1109\/ACCESS.2022.3177270","article-title":"Hyperledger Fabric-Based Lightweight Group Management (H-LGM) for IoT Devices","volume":"10","author":"Maeng","year":"2022","journal-title":"IEEE Access"},{"key":"ref_94","first-page":"1731","article-title":"Enhancing IoT Data Security with Lightweight Blockchain and Okamoto Uchiyama Homomorphic Encryption","volume":"138","author":"Mohammed","year":"2024","journal-title":"Comput. Model. Eng. Sci."},{"key":"ref_95","doi-asserted-by":"crossref","first-page":"101202","DOI":"10.1016\/j.iot.2024.101202","article-title":"Multi-Dimension-Precision Chaotic Encryption Mechanism for Internet of Things","volume":"26","author":"Fan","year":"2024","journal-title":"Internet Things"},{"key":"ref_96","doi-asserted-by":"crossref","first-page":"2792","DOI":"10.1109\/OJCOMS.2024.3391728","article-title":"Securing Digital Identity in the Zero Trust Architecture: A Blockchain Approach to Privacy-Focused Multi-Factor Authentication","volume":"5","author":"Muhammad","year":"2024","journal-title":"IEEE Open J. Commun. Soc."},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Boji\u010d Burgos, J., and Pusti\u0161ek, M. (2024). Decentralized IoT Data Authentication with Signature Aggregation. Sensors, 24.","DOI":"10.3390\/s24031037"},{"key":"ref_98","doi-asserted-by":"crossref","unstructured":"Saideh, M., Jamont, J.-P., and Vercouter, L. (2024). Opportunistic Sensor-Based Authentication Factors in and for the Internet of Things. Sensors, 24.","DOI":"10.3390\/s24144621"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Munshi, A., and Alshawi, B. (2024). Hybrid Encryption Model for Secured Three-Phase Authentication Protocol in IoT. J. Sens. Actuator Netw., 13.","DOI":"10.3390\/jsan13040041"},{"key":"ref_100","doi-asserted-by":"crossref","unstructured":"Tun, N.W., and Mambo, M. (2024). Secure PUF-Based Authentication Systems. Sensors, 24.","DOI":"10.3390\/s24165295"},{"key":"ref_101","doi-asserted-by":"crossref","unstructured":"Zhang, B., Zhang, T., Xi, Z., Chen, P., Wei, J., and Liu, Y. (2024). Secure Device-to-Device Communication in IoT: Fuzzy Identity from Wireless Channel State Information for Identity-Based Encryption. Electronics, 13.","DOI":"10.3390\/electronics13050984"},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Wang, J., and Li, J. (2024). Blockchain and Access Control Encryption-Empowered IoT Knowledge Sharing for Cloud-Edge Orchestrated Personalized Privacy-Preserving Federated Learning. Appl. Sci., 14.","DOI":"10.3390\/app14051743"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Fenner, J., Galeas, P., Escobar, F., and Neira, R. (2024). Secure IoT Communication: Implementing a One-Time Pad Protocol with True Random Numbers and Secure Multiparty Sums. Appl. Sci., 14.","DOI":"10.20944\/preprints202403.1167.v1"},{"key":"ref_104","doi-asserted-by":"crossref","first-page":"1859","DOI":"10.1007\/s10207-024-00825-z","article-title":"AutoPKI: Public Key Infrastructure for IoT with Automated Trust Transfer","volume":"23","author":"Bouget","year":"2024","journal-title":"Int. J. Inf. Secur."},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"El-Hajj, M., and Beune, P. (2024). Decentralized Zone-Based PKI: A Lightweight Security Framework for IoT Ecosystems. Information, 15.","DOI":"10.3390\/info15060304"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Zhang, J., Ouda, A., and Abu-Rukba, R. (2024). Authentication and Key Agreement Protocol in Hybrid Edge\u2013Fog\u2013Cloud Computing Enhanced by 5G Networks. Future Internet, 16.","DOI":"10.3390\/fi16060209"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Baird, I., Ghaleb, B., Wadhaj, I., Russell, G., and Buchanan, W.J. (2024). Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains. Electronics, 13.","DOI":"10.3390\/electronics13173467"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"12575","DOI":"10.1007\/s12652-022-04321-x","article-title":"PUF-Based Mutual Authentication and Session Key Establishment Protocol for IoT Devices","volume":"14","author":"Zerrouki","year":"2023","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_109","doi-asserted-by":"crossref","first-page":"6227","DOI":"10.1007\/s12652-021-03421-4","article-title":"A Novel Lightweight PUF Based Authentication Protocol for IoT without Explicit CRPs in Verifier Database","volume":"14","author":"Nimmy","year":"2023","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"ref_110","first-page":"173","article-title":"Enhancing Healthcare Data Security in IoT Environments Using Blockchain and DCGRU with Twofish Encryption","volume":"2","author":"Ramachandraiah","year":"2023","journal-title":"Inf. Dyn. Appl."},{"key":"ref_111","doi-asserted-by":"crossref","first-page":"2873","DOI":"10.1007\/s11276-023-03342-4","article-title":"A Novel and Quantum-Resistant Handover Authentication Protocol in IoT Environment","volume":"29","author":"Zhang","year":"2023","journal-title":"Wirel. Netw."},{"key":"ref_112","doi-asserted-by":"crossref","first-page":"100685","DOI":"10.1016\/j.iot.2023.100685","article-title":"FSMFA: Efficient Firmware-Secure Multi-Factor Authentication Protocol for IoT Devices","volume":"21","author":"Chen","year":"2023","journal-title":"Internet Things"},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"101389","DOI":"10.1016\/j.iot.2024.101389","article-title":"A Quantum-Safe Authentication Scheme for IoT Devices Using Homomorphic Encryption and Weak Physical Unclonable Functions with No Helper Data","volume":"28","author":"Arjona","year":"2024","journal-title":"Internet Things"},{"key":"ref_114","doi-asserted-by":"crossref","first-page":"101241","DOI":"10.1016\/j.iot.2024.101241","article-title":"Robust Encryption Framework for IoT Devices Based on Bit-Plane Extraction, Chaotic Sine Models, and Quantum Operations","volume":"27","author":"Rehman","year":"2024","journal-title":"Internet Things"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"124355","DOI":"10.1016\/j.eswa.2024.124355","article-title":"A Lattice-Based Data Sharing Functional Encryption Scheme with HRA Security for IoT","volume":"254","author":"Hou","year":"2024","journal-title":"Expert. Syst. Appl."},{"key":"ref_116","first-page":"103885","article-title":"Self-Sovereign Identity Management in Ciphertext Policy Attribute Based Encryption for IoT Protocols","volume":"86","author":"Deng","year":"2024","journal-title":"J. Inf. Secur. Appl."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"109424","DOI":"10.1016\/j.compeleceng.2024.109424","article-title":"Load-Balanced Attribute-Based Outsourced Encryption for Constrained IoT Devices","volume":"118","author":"Gasmi","year":"2024","journal-title":"Comput. Electr. Eng."},{"key":"ref_118","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1016\/j.matpr.2021.03.424","article-title":"An Advanced and Effective Encryption Methodology Used for Modern IoT Security","volume":"81","author":"Velmurugan","year":"2023","journal-title":"Mater. Today Proc."},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Achkouty, F., Gallon, L., and Chbeir, R. (2024). RDSC: Range-Based Device Spatial Clustering for IoT Networks. Sensors, 24.","DOI":"10.3390\/s24175851"},{"key":"ref_120","doi-asserted-by":"crossref","unstructured":"Ehmer, J., Savaria, Y., Granado, B., David, J.-P., and Denoulet, J. (2024). Network Attack Classification with a Shallow Neural Network for Internet and Internet of Things (IoT) Traffic. Electronics, 13.","DOI":"10.3390\/electronics13163318"},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Canavese, D., Mannella, L., Regano, L., and Basile, C. (2024). Security at the Edge for Resource-Limited IoT Devices. Sensors, 24.","DOI":"10.3390\/s24020590"},{"key":"ref_122","first-page":"73","article-title":"A 6G Network: Future of Nations? Challenges in 6G Communications","volume":"44","author":"Singh","year":"2023","journal-title":"Tuijin Jishu\/J. Propuls. Technol."},{"key":"ref_123","doi-asserted-by":"crossref","first-page":"804","DOI":"10.3390\/telecom5030041","article-title":"AI-Enabled 6G Internet of Things: Opportunities, Key Technologies, Challenges, and Future Directions","volume":"5","author":"Maduranga","year":"2024","journal-title":"Telecom"},{"key":"ref_124","doi-asserted-by":"crossref","unstructured":"Bakhshi, T., Ghita, B., and Kuzminykh, I. (2024). A Review of IoT Firmware Vulnerabilities and Auditing Techniques. Sensors, 24.","DOI":"10.3390\/s24020708"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Al Hanif, A., and Ilyas, M. (2024). Effective Feature Engineering Framework for Securing MQTT Protocol in IoT Environments. Sensors, 24.","DOI":"10.3390\/s24061782"},{"key":"ref_126","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/s13677-023-00574-9","article-title":"A Transformer-Based Network Intrusion Detection Approach for Cloud Security","volume":"13","author":"Long","year":"2024","journal-title":"J. Cloud Comput."},{"key":"ref_127","doi-asserted-by":"crossref","first-page":"407","DOI":"10.59670\/ml.v20iS13.6472","article-title":"Detection and Mitigation of DDOS Attack in SDN Environment Using Hybrid CNN-LSTM","volume":"20","author":"Rajan","year":"2023","journal-title":"Migr. Lett."},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1016\/j.dcan.2022.08.012","article-title":"Feature Extraction for Machine Learning-Based Intrusion Detection in IoT Networks","volume":"10","author":"Sarhan","year":"2024","journal-title":"Digit. Commun. Netw."},{"key":"ref_129","doi-asserted-by":"crossref","unstructured":"Hu, Z. (2024). Knowledge Graph Based Large Scale Network Security Threat Detection Techniques. Appl. Math. Nonlinear Sci., 9.","DOI":"10.2478\/amns-2024-0046"},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"101136","DOI":"10.1016\/j.iot.2024.101136","article-title":"Secure Decentralized Firmware Update Delivery Service for Internet of Things","volume":"26","author":"Oktian","year":"2024","journal-title":"Internet Things"},{"key":"ref_131","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1016\/j.procs.2024.08.022","article-title":"Over-the-Air Firmware Update in LoRaWAN Networks: A New Module-Based Approach","volume":"241","author":"Nguyen","year":"2024","journal-title":"Procedia Comput. Sci."},{"key":"ref_132","doi-asserted-by":"crossref","first-page":"103068","DOI":"10.1016\/j.cose.2022.103068","article-title":"VERI: A Large-Scale Open-Source Components Vulnerability Detection in IoT Firmware","volume":"126","author":"Cheng","year":"2023","journal-title":"Comput. Secur."},{"key":"ref_133","doi-asserted-by":"crossref","first-page":"103699","DOI":"10.1016\/j.jnca.2023.103699","article-title":"PARIOT: Anti-Repackaging for IoT Firmware Integrity","volume":"217","author":"Verderame","year":"2023","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_134","doi-asserted-by":"crossref","first-page":"101406","DOI":"10.1016\/j.measen.2024.101406","article-title":"Framework to Analyze and Exploit the Smart Home IoT Firmware","volume":"37","author":"Kaushik","year":"2025","journal-title":"Meas. Sens."},{"key":"ref_135","doi-asserted-by":"crossref","first-page":"124122","DOI":"10.1016\/j.eswa.2024.124122","article-title":"An Intelligent Mechanism for Dynamic Spectrum Sharing in 5G IoT Networks","volume":"252","author":"Xu","year":"2024","journal-title":"Expert Syst. Appl."},{"key":"ref_136","doi-asserted-by":"crossref","first-page":"110857","DOI":"10.1016\/j.comnet.2024.110857","article-title":"Enhancing Smart City IoT Communication: A Two-Layer NOMA-Based Network with Caching Mechanisms and Optimized Resource Allocation","volume":"255","author":"Alkhaldi","year":"2024","journal-title":"Comput. Netw."},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"Ortiz-Ruiz, E., Bermejo, J.R., Sicilia, J.A., and Bermejo, J. (2024). Machine Learning Techniques for Cyberattack Prevention in IoT Systems: A Comparative Perspective of Cybersecurity and Cyberdefense in Colombia. Electronics, 13.","DOI":"10.3390\/electronics13050824"},{"key":"ref_138","doi-asserted-by":"crossref","unstructured":"Valencia-Arias, A., Gonz\u00e1lez-Ruiz, J.D., Verde Flores, L., Vega-Mori, L., Rodr\u00edguez-Correa, P., and S\u00e1nchez Santos, G. (2024). Machine Learning and Blockchain: A Bibliometric Study on Security and Privacy. Information, 15.","DOI":"10.3390\/info15010065"},{"key":"ref_139","doi-asserted-by":"crossref","unstructured":"El-Sofany, H., El-Seoud, S.A., Karam, O.H., and Bouallegue, B. (2024). Using Machine Learning Algorithms to Enhance IoT System Security. Sci. Rep., 14.","DOI":"10.1038\/s41598-024-62861-y"},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Priyadarshini, I. (2024). Anomaly Detection of IoT Cyberattacks in Smart Cities Using Federated Learning and Split Learning. Big Data Cogn. Comput., 8.","DOI":"10.3390\/bdcc8030021"},{"key":"ref_141","doi-asserted-by":"crossref","unstructured":"Alrubayyi, H., Alshareef, M.S., Nadeem, Z., Abdelmoniem, A.M., and Jaber, M. (2024). Security Threats and Promising Solutions Arising from the Intersection of AI and IoT: A Study of IoMT and IoET Applications. Future Internet, 16.","DOI":"10.3390\/fi16030085"},{"key":"ref_142","doi-asserted-by":"crossref","first-page":"100670","DOI":"10.1016\/j.iot.2022.100670","article-title":"Energy Consumption of On-Device Machine Learning Models for IoT Intrusion Detection","volume":"21","author":"Tekin","year":"2023","journal-title":"Internet Things"},{"key":"ref_143","doi-asserted-by":"crossref","first-page":"129406","DOI":"10.1016\/j.neucom.2025.129406","article-title":"The Good, the Bad, and the Algorithm: The Impact of Generative AI on Cybersecurity","volume":"623","author":"Coppolino","year":"2025","journal-title":"Neurocomputing"},{"key":"ref_144","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1016\/j.future.2022.10.016","article-title":"TEBDS: A Trusted Execution Environment-and-Blockchain-Supported IoT Data Sharing System","volume":"140","author":"Xie","year":"2023","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_145","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1186\/s13635-020-00111-0","article-title":"IoT Cyber Risk: A Holistic Analysis of Cyber Risk Assessment Frameworks, Risk Vectors, and Risk Ranking Process","volume":"2020","author":"Kandasamy","year":"2020","journal-title":"EURASIP J. Inf. Secur."},{"key":"ref_146","doi-asserted-by":"crossref","unstructured":"Parsons, E.K., Panaousis, E., Loukas, G., and Sakellari, G. (2023). A Survey on Cyber Risk Management for the Internet of Things. Appl. Sci., 13.","DOI":"10.20944\/preprints202306.2172.v1"},{"key":"ref_147","first-page":"555","article-title":"IoT Security Risk Management: A Framework and Teaching Approach","volume":"22","author":"Affia","year":"2023","journal-title":"Inform. Educ."},{"key":"ref_148","doi-asserted-by":"crossref","unstructured":"Popescu, T., Popescu, A., and Prostean, G. (2021). IoT Security Risk Management Strategy Reference Model (IoTSRM2). Future Internet, 13.","DOI":"10.3390\/fi13060148"},{"key":"ref_149","doi-asserted-by":"crossref","first-page":"106009","DOI":"10.1016\/j.clsr.2024.106009","article-title":"Cyber Resilience Act 2022: A Silver Bullet for Cybersecurity of IoT Devices or a Shot in the Dark?","volume":"54","author":"Shaffique","year":"2024","journal-title":"Comput. Law Secur. Rev."},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"101437","DOI":"10.1016\/j.iot.2024.101437","article-title":"Dynamic Risk Assessment Approach for Analysing Cyber Security Events in Medical IoT Networks","volume":"29","author":"Czekster","year":"2025","journal-title":"Internet Things"},{"key":"ref_151","doi-asserted-by":"crossref","first-page":"104128","DOI":"10.1016\/j.cose.2024.104128","article-title":"Adaptive Edge Security Framework for Dynamic IoT Security Policies in Diverse Environments","volume":"148","author":"Halgamuge","year":"2025","journal-title":"Comput. Secur."},{"key":"ref_152","doi-asserted-by":"crossref","first-page":"101333","DOI":"10.1016\/j.iot.2024.101333","article-title":"Vulnerability-Oriented Risk Identification Framework for IoT Risk Assessment","volume":"27","author":"Beyrouti","year":"2024","journal-title":"Internet Things"}],"container-title":["Computers"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/2\/61\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T16:31:17Z","timestamp":1760027477000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2073-431X\/14\/2\/61"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,2,11]]},"references-count":152,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2025,2]]}},"alternative-id":["computers14020061"],"URL":"https:\/\/doi.org\/10.3390\/computers14020061","relation":{},"ISSN":["2073-431X"],"issn-type":[{"value":"2073-431X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,2,11]]}}}