{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T03:07:27Z","timestamp":1773976047035,"version":"3.50.1"},"reference-count":98,"publisher":"MDPI AG","issue":"2","license":[{"start":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T00:00:00Z","timestamp":1768521600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electronics"],"abstract":"<jats:p>The increasing deployment of interconnected devices in Smart Cities and Industrial Internet of Things (IIoT) environments has significantly enhanced operational efficiency, automation, and real-time data analytics. However, this rapid digitization also introduces complex security and privacy challenges, particularly in the handling of sensitive data across heterogeneous and resource-constrained networks. This review explores the current landscape of privacy-preserving protocols designed for Smart City and IIoT infrastructures. We examine state-of-the-art approaches including lightweight cryptographic schemes, secure data aggregation, anonymous communication protocols, and blockchain-based frameworks. The paper also analyzes practical trade-offs between security, latency, and computational overhead in real-world deployments. Open research challenges such as secure interoperability, privacy in federated learning, and resilience against AI-driven cyberattacks are discussed. Finally, the paper outlines promising research directions and technologies that can enable scalable, secure, and privacy-aware network infrastructures for future urban and industrial ecosystems.<\/jats:p>","DOI":"10.3390\/electronics15020399","type":"journal-article","created":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T13:27:53Z","timestamp":1768570073000},"page":"399","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Privacy-Preserving Protocols in Smart Cities and Industrial IoT: Challenges, Trends, and Future Directions"],"prefix":"10.3390","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-8872-5721","authenticated-orcid":false,"given":"Manuel Jos\u00e9 Cabral dos Santos","family":"Reis","sequence":"first","affiliation":[{"name":"Engineering Departement\/IEETA, University of Tr\u00e1s-os-Montes e Alto Douro, Quinta de Prados, 5000-801 Vila Real, Portugal"}]}],"member":"1968","published-online":{"date-parts":[[2026,1,16]]},"reference":[{"key":"ref_1","first-page":"31","article-title":"A Review of Lightweight Security and Privacy for Resource-Constrained IoT Devices","volume":"78","author":"Kumar","year":"2024","journal-title":"Comput. Mater. Contin."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Mathews, R., and Jose, D.V. (2024). Hybrid homomorphic-asymmetric lightweight cryptosystem for securing smart devices: A review. Trans. Emerg. Telecommun. Technol., 35.","DOI":"10.1002\/ett.4866"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"46","DOI":"10.58496\/MJCS\/2024\/015","article-title":"A New Lightweight Cryptosystem for IoT in Smart City Environments","volume":"4","author":"Hazzaa","year":"2024","journal-title":"Mesopotamian J. Cybersecur."},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Khalique, A., Siddiqui, F., Ahad, M.A., and Hussain, I. (2025). Lightweight authentication for IoT devices (LAID) in sustainable smart cities. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-10181-0"},{"key":"ref_5","unstructured":"Dhinakaran, D., Sankar, S.M.U., Selvaraj, D., and Raja, S.E. (2024). Privacy-Preserving Data in IoT-based Cloud Systems: A Comprehensive Survey with AI Integration. arXiv."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Ali, M., Suchismita, M., Ali, S.S., and Choi, B.J. (2025). Privacy-Preserving Machine Learning for IoT-Integrated Smart Grids: Recent Advances, Opportunities, and Challenges. Energies, 18.","DOI":"10.3390\/en18102515"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Wei, L., and Liu, Z. (2025). Light weight blockchain with IoT devices to secure smart non-fungible tokens using hybrid secure functions. Sci. Rep., 15.","DOI":"10.1038\/s41598-025-16945-y"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Majeed, A., Patni, S., and Hwang, S.O. (2025). A Comprehensive Analysis of Privacy-Preserving Solutions Developed for IoT-Based Systems and Applications. Electronics, 14.","DOI":"10.3390\/electronics14112106"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Smajlovi\u0107, H., Shajii, A., Berger, B., Cho, H., and Numanagi\u0107, I. (2023). Sequre: A high-performance framework for secure multiparty computation enables biomedical data sharing. Genome Biol., 24.","DOI":"10.1186\/s13059-022-02841-5"},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"53881","DOI":"10.1109\/ACCESS.2024.3388992","article-title":"Secure Multi-Party Computation for Machine Learning: A Survey","volume":"12","author":"Zhou","year":"2024","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Geppert, T., Deml, S., Sturzenegger, D., and Ebert, N. (2022). Trusted Execution Environments: Applications and Organizational Challenges. Front. Comput. Sci., 4.","DOI":"10.3389\/fcomp.2022.930741"},{"key":"ref_12","doi-asserted-by":"crossref","unstructured":"Alotaibi, B. (2023). A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities. Sensors, 23.","DOI":"10.20944\/preprints202307.0771.v1"},{"key":"ref_13","unstructured":"Joint Task Force on Cybersecurity Education (2020). Security and Privacy Controls for Information Systems and Organizations, National Institute of Standards and Technology. NIST Special Publication 800-53, Revision 5."},{"key":"ref_14","unstructured":"Boeckl, K., Fagan, M., Fisher, N., Lefkovitz, N., Megas, K., Nadeau, J., Ronquillo, D., Smith, E., and Wald, D. (2020). NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management, Version 1.0, National Institute of Standards and Technology. Technical Report."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/j.ins.2022.12.088","article-title":"Federated Learning in Smart Cities: Privacy and Security Survey","volume":"632","author":"Li","year":"2023","journal-title":"Inf. Sci."},{"key":"ref_16","unstructured":"European Parliament and the Council of the European Union (2025, September 02). Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the Protection of Natural Persons with Regard to the Processing of Personal Data and on the Free Movement of Such Data, and Repealing Directive 95\/46\/EC (General Data Protection Regulation). Available online: https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj\/eng."},{"key":"ref_17","unstructured":"European Parliament and the Council of the European Union (2025, September 02). Directive (EU) 2022\/2555 of the European Parliament and of the Council of 14 December 2022 on Measures for a High Common Level of Cybersecurity Across the Union, Amending Regulation (EU) No 910\/2014 and Directive (EU) 2018\/1972, and Repealing Directive (EU) 2016\/1148 (NIS 2 Directive). Available online: https:\/\/eur-lex.europa.eu\/eli\/dir\/2022\/2555\/oj\/eng."},{"key":"ref_18","unstructured":"European Parliament and the Council of the European Union (2025, September 02). Regulation (EU) 2023\/2854 of the European Parliament and of the Council of 13 December 2023 on Harmonised Rules on Fair Access to and Use of Data (Data Act). Available online: https:\/\/eur-lex.europa.eu\/eli\/reg\/2023\/2854\/oj\/eng."},{"key":"ref_19","unstructured":"European Parliament and the Council of the European Union (2025, September 02). Regulation (EU) 2024\/1689 of the European Parliament and of the Council of 13 June 2024 Laying Down Harmonised Rules on Artificial Intelligence (Artificial Intelligence Act). Available online: https:\/\/eur-lex.europa.eu\/eli\/reg\/2024\/1689\/oj\/eng."},{"key":"ref_20","unstructured":"European Telecommunications Standards Institute (ETSI) (2024). Cyber Security for Consumer Internet of Things: Baseline Requirements (Standard No. ETSI EN 303 645 V3.1.3 (2024-09)). Available online: https:\/\/www.etsi.org\/deliver\/etsi_en\/303600_303699\/303645\/03.01.03_60\/en_303645v030103p.pdf."},{"key":"ref_21","unstructured":"International Organization for Standardization (ISO), and International Electrotechnical Commission (IEC) (2022). Information Security, Cybersecurity and Privacy Protection\u2014Information Security Management Systems\u2014Requirements (Standard No. ISO\/IEC 27001:2022). Available online: https:\/\/www.iso.org\/standard\/27001."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Peralta Abad\u00eda, J.J., Walther, C., Osman, A., and Smarsly, K. (2022). A systematic survey of Internet of Things frameworks for smart city applications. Sustain. Cities Soc., 83.","DOI":"10.1016\/j.scs.2022.103949"},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Pinto, G.P., Donta, P.K., Dustdar, S., and Prazeres, C. (2024). A Systematic Review on Privacy-Aware IoT Personal Data Stores. Sensors, 24.","DOI":"10.3390\/s24072197"},{"key":"ref_24","unstructured":"OECD (2023). Smart City Data Governance, Organisation for Economic Co-Operation and Development. Technical Report."},{"key":"ref_25","unstructured":"Autoriteit Persoonsgegevens (Dutch DPA) (2025, September 02). The Dutch Data Protection Authority (DPA) Concerned About Smart Traffic Lights. Available online: https:\/\/www.autoriteitpersoonsgegevens.nl\/en\/current\/the-dutch-data-protection-authority-dpa-concerned-about-smart-traffic-lights."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Wang, X., Tang, Z., Guo, J., Meng, T., Wang, C., Wang, T., and Jia, W. (2025). Empowering Edge Intelligence: A Comprehensive Survey on On-Device AI Models. ACM Comput. Surv., 57.","DOI":"10.1145\/3724420"},{"key":"ref_27","unstructured":"Wang, X., Wang, B., Wu, Y., Ning, Z., Guo, S., and Yu, F.R. (2024). A Survey on Trustworthy Edge Intelligence: From Security and Reliability to Transparency and Sustainability. arXiv."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Zhang, T., Wang, G., Xue, C., Wang, J., Nixon, M., and Han, S. (2024). Time-Sensitive Networking (TSN) for Industrial Automation: Current Advances and Future Directions. ACM Comput. Surv., early access.","DOI":"10.1145\/3695248"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Fedullo, T., Morato, A., Tramarin, F., Rovati, L., and Vitturi, S. (2022). A Comprehensive Review on Time Sensitive Networks with a Special Focus on Its Applicability to Industrial Smart and Distributed Measurement Systems. Sensors, 22.","DOI":"10.3390\/s22041638"},{"key":"ref_30","unstructured":"Institute of Electrical and Electronics Engineers (IEEE) (2025). IEEE 802.1 Time-Sensitive Networking (TSN) Task Group, IEEE. Available online: https:\/\/1.ieee802.org\/tsn\/."},{"key":"ref_31","unstructured":"International Electrotechnical Commission (IEC), and Institute of Electrical and Electronics Engineers (IEEE) (2025). IEC\/IEEE 60802 Joint Project: TSN Profile for Industrial Automation, IEEE. Available online: https:\/\/1.ieee802.org\/tsn\/iec-ieee-60802\/."},{"key":"ref_32","doi-asserted-by":"crossref","unstructured":"Moure-Garrido, N., Casillas-P\u00e9rez, D., Ortego, J., and V\u00e1zquez-Gallego, F. (2024). Reducing DNS Traffic to Enhance Home IoT Device Privacy. Sensors, 24.","DOI":"10.3390\/s24092690"},{"key":"ref_33","first-page":"455","article-title":"A Comprehensive Survey on IoT Attacks: Taxonomy, Detection Mechanisms and Challenges","volume":"2","author":"Sasi","year":"2024","journal-title":"J. Inf. Intell."},{"key":"ref_34","unstructured":"European Union Agency for Cybersecurity (ENISA) (2024). ENISA Threat Landscape 2024, ENISA. Technical Report."},{"key":"ref_35","first-page":"404","article-title":"A Survey on Membership Inference Attacks and Defenses in Machine Learning","volume":"2","author":"Niu","year":"2024","journal-title":"J. Inf. Intell."},{"key":"ref_36","unstructured":"Turan, M.S., McKay, K.A., Chang, D., Bassham, L.E., Kang, J., Waller, N.D., Kelsey, J.M., and Hong, D. (2023). Status Report on the Final Round of the NIST Lightweight Cryptography Standardization Process, National Institute of Standards and Technology. NIST Interagency or Internal Report NIST IR 8454."},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Madushan, H., Salam, I., and Alawatugoda, J. (2022). A Review of the NIST Lightweight Cryptography Finalists and Their Fault Analyses. Electronics, 11.","DOI":"10.3390\/electronics11244199"},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Soto-Cruz, J., Ruiz-Ibarra, E., V\u00e1zquez-Castillo, J., Espinoza-Ruiz, A., Castillo-Atoche, A., and Mass-Sanchez, J. (2025). A Survey of Efficient Lightweight Cryptography for Power-Constrained Microcontrollers. Technologies, 13.","DOI":"10.20944\/preprints202410.2545.v1"},{"key":"ref_39","doi-asserted-by":"crossref","unstructured":"S\u00f6nmez Turan, M., McKay, K., Kang, J., Kelsey, J., and Chang, D. (2025). Ascon-Based Lightweight Cryptography Standards for Constrained Devices: Authenticated Encryption, Hash, and Extendable Output Functions, National Institute of Standards and Technology. NIST Special Publication 800-232.","DOI":"10.6028\/NIST.SP.800-232"},{"key":"ref_40","unstructured":"National Institute of Standards and Technology (NIST) (2025, September 02). NIST Finalizes \u201cLightweight Cryptography\u201d Standard to Protect Small Devices, Available online: https:\/\/www.nist.gov\/news-events\/news\/2025\/xx\/nist-finalizes-lightweight-cryptography-standard."},{"key":"ref_41","unstructured":"National Institute of Standards and Technology (NIST) (2025, September 02). NIST Selects \u201cLightweight Cryptography\u201d Algorithms to Protect Small Devices, Available online: https:\/\/www.nist.gov\/news-events\/news\/2023\/xx\/nist-selects-lightweight-cryptography-algorithms-protect-small-devices."},{"key":"ref_42","unstructured":"McKay, K., and National Institute of Standards and Technology (NIST) (2023). Benchmarking of NIST LWC Finalists on Microcontrollers."},{"key":"ref_43","doi-asserted-by":"crossref","unstructured":"Selander, G., Mattsson, J.P., and Palombini, F. (2024). RFC 9528: Ephemeral Diffie-Hellman Over COSE (EDHOC), Internet Engineering Task Force (IETF).","DOI":"10.17487\/RFC9528"},{"key":"ref_44","unstructured":"National Institute of Standards and Technology (NIST) (2024). Module-Lattice-Based Key-Encapsulation Mechanism Standard (ML-KEM); Federal Information Processing Standards Publication FIPS 203."},{"key":"ref_45","unstructured":"National Institute of Standards and Technology (NIST) (2024). Module-Lattice-Based Digital Signature Standard (ML-DSA); Federal Information Processing Standards Publication FIPS 204."},{"key":"ref_46","doi-asserted-by":"crossref","unstructured":"Zhou, F., Wang, X., and Zhang, W. (2024). Privacy-Preserving and Verifiable Data Aggregation for Internet of Vehicles. Comput. Netw., 241.","DOI":"10.1016\/j.comcom.2024.02.022"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Zhang, J., Li, X., Chen, Y., and Wang, J. (2023). A Lightweight Privacy-Preserving Data Aggregation Scheme Against Malicious Aggregators for IoT. J. King Saud Univ. Comput. Inf. Sci., 35.","DOI":"10.1016\/j.jksuci.2023.03.002"},{"key":"ref_48","doi-asserted-by":"crossref","unstructured":"Loukil, F., Ghedira-Guegan, C., Boukadi, K., and Benharkat, A. (2021). Privacy-Preserving IoT Data Aggregation Based on Blockchain and Homomorphic Encryption. Sensors, 21.","DOI":"10.3390\/s21072452"},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Aziz, R., Aljarah, I., Abdullah, S., and Faris, H. (2023). Exploring Homomorphic Encryption and Differential Privacy in Federated Learning: A Survey. Future Internet, 15.","DOI":"10.3390\/fi15090310"},{"key":"ref_50","doi-asserted-by":"crossref","unstructured":"Tayyeh, H.K., Hammoudeh, M., and Ould, S.M. (2024). A Differential Privacy Approach in Federated Learning. Computers, 13.","DOI":"10.3390\/computers13110277"},{"key":"ref_51","doi-asserted-by":"crossref","unstructured":"Zheng, L., Zhang, Q., Li, W., and Chen, H. (2025). Sensitivity-Aware Differential Privacy for Federated Medical Imaging. Sensors, 25.","DOI":"10.3390\/s25092847"},{"key":"ref_52","doi-asserted-by":"crossref","unstructured":"Dritsas, E., and Trigka, M. (2025). Federated Learning for IoT: A Survey of Techniques, Challenges, and Applications. IoT, 14.","DOI":"10.3390\/jsan14010009"},{"key":"ref_53","doi-asserted-by":"crossref","unstructured":"Zhang, X., Sun, K., and Liu, Q. (2025). A Review of Research on Secure Aggregation for Privacy-Preserving Federated Learning. Future Internet, 17.","DOI":"10.3390\/fi17070308"},{"key":"ref_54","doi-asserted-by":"crossref","unstructured":"Zhao, J., Bagchi, S., Avestimehr, S., Chan, K., Chaterji, S., Dimitriadis, D., Li, J., Nourian, A., and Roth, H. (2025). A Survey of Federated Learning Privacy Attacks, Defenses, Applications, and Policy Landscape. ACM Comput. Surv., 57.","DOI":"10.1145\/3724113"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Shi, R., Liu, Y., Zhang, C., and Li, W. (2024). More Efficient and Verifiable Privacy-Preserving Aggregation for Federated Learning. Appl. Sci., 14.","DOI":"10.3390\/app14135361"},{"key":"ref_56","doi-asserted-by":"crossref","unstructured":"de Laage, R., Yuhala, P., Wicht, F.X., Felber, P., Cachin, C., and Schiavoni, V. (2025, January 10\u201313). Practical Secure Aggregation by Combining Cryptography and Trusted Execution Environments. Proceedings of the 19th ACM International Conference on Distributed and Event-Based Systems, Gothenburg, Sweden.","DOI":"10.1145\/3701717.3730543"},{"key":"ref_57","doi-asserted-by":"crossref","first-page":"276","DOI":"10.56553\/popets-2024-0050","article-title":"MixMatch: Flow Matching for Mixnet Traffic","volume":"2024","author":"Oldenburg","year":"2024","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_58","doi-asserted-by":"crossref","first-page":"665","DOI":"10.56553\/popets-2024-0136","article-title":"Are Continuous Stop-and-Go Mixnets Provably Secure?","volume":"2024","author":"Das","year":"2024","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_59","doi-asserted-by":"crossref","unstructured":"Rahimi, M. (2024, January 24\u201326). CLAM: Client-Aware Routing in Mix Networks. Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia Security, Baiona, Spain.","DOI":"10.1145\/3658664.3659631"},{"key":"ref_60","doi-asserted-by":"crossref","unstructured":"Benarous, L., Zeadally, S., Boudjit, S., and Mellouk, A. (2025). A Review of Pseudonym Change Strategies for Location Privacy in Vehicular Networks. ACM Comput. Surv., 57.","DOI":"10.1145\/3718736"},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Sutradhar, K., Das, A., Khan, M.N., Shivam, P., and Khandelwal, P. (2024). A Survey on Privacy-Preserving Authentication Protocols for Vehicular Networks. Comput. Netw., 240.","DOI":"10.1016\/j.comcom.2024.02.024"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Tao, Y., Wu, H., Javanmardi, E., Tsukada, M., and Esaki, H. (2024). Zero-Knowledge Proof of Distinct Identity for Sybil-Resistant Pseudonyms in C-ITS. arXiv.","DOI":"10.1109\/IV55156.2024.10588511"},{"key":"ref_63","doi-asserted-by":"crossref","unstructured":"Khan, I., Majib, Y., Ullah, R., and Rana, O. (2024). Blockchain Applications for Internet of Things\u2014A Survey. Array, 27.","DOI":"10.1016\/j.iot.2024.101254"},{"key":"ref_64","doi-asserted-by":"crossref","unstructured":"Mathur, S., Kalla, A., G\u00fcr, G., Bohra, M.K., and Liyanage, M. (2023). A Survey on the Role of Blockchain for IoT: Applications and Challenges. Comput. Netw., 225.","DOI":"10.1016\/j.comnet.2023.109726"},{"key":"ref_65","doi-asserted-by":"crossref","unstructured":"Enaya, A., Fernando, X., and Kashef, R. (2025). Survey of Blockchain-Based Applications for IoT. Appl. Sci., 15.","DOI":"10.3390\/app15084562"},{"key":"ref_66","doi-asserted-by":"crossref","unstructured":"Hu, T., Yang, S., Wang, Y., Li, G., Wang, Y., Wang, G., and Yin, M. (2023). A Blockchain-Based Access Control Framework for Secure IoT Data Management. Sensors, 23.","DOI":"10.3390\/s23208535"},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Zhou, L., Diro, A., Saini, A., Kaisar, S., and Hiep, P.C. (2024). Leveraging Zero Knowledge Proofs for Blockchain-Based Identity Sharing: A Survey of Advancements, Challenges and Opportunities. J. Inf. Secur. Appl., 80.","DOI":"10.1016\/j.jisa.2023.103678"},{"key":"ref_68","unstructured":"Roelink, B.O., El-Hajj, M., and Sarmah, D. (2024). Promise of Zero-Knowledge Proofs (ZKPs) for Blockchain Systems. Secur. Priv., 7."},{"key":"ref_69","first-page":"1143","article-title":"Privacy Protection for Blockchain-Based Healthcare IoT Systems: A Survey","volume":"11","author":"Qi","year":"2024","journal-title":"IEEE\/CAA J. Autom. Sin."},{"key":"ref_70","unstructured":"OPC Foundation (2023). OPC UA: Interoperability for Industrie 4.0 and IoT, OPC Foundation."},{"key":"ref_71","unstructured":"oneM2M Partnership Project (2025, September 02). oneM2M: IoT Standards for Interoperable and Secure Services. Available online: https:\/\/www.onem2m.org."},{"key":"ref_72","unstructured":"International Society of Automation (ISA), and International Electrotechnical Commission (IEC) (2025). Series of Standards for Industrial Automation and Control Systems Security (Standard No. ISA\/IEC 62443). Available online: https:\/\/www.iec.ch\/dyn\/www\/f?p=103:85:0::::FSP_LANG_ID:25."},{"key":"ref_73","unstructured":"International Data Spaces Association (IDSA) (2022). IDS Reference Architecture Model (IDS-RAM), Version 4.0, International Data Spaces Association. Available online: https:\/\/internationaldataspaces.org\/publications\/ids-reference-architecture-model\/."},{"key":"ref_74","unstructured":"International Data Spaces Association (IDSA) (2025, September 02). Understanding the IDS Reference Architecture Model. Available online: https:\/\/internationaldataspaces.org\/understanding-the-idsa-reference-architecture-model\/."},{"key":"ref_75","unstructured":"World Wide Web Consortium (W3C) (2025, September 02). Verifiable Credentials Data Model v2.0. Available online: https:\/\/www.w3.org\/TR\/vc-data-model-2.0\/."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Li, Y., Xie, B., Guo, S., Yang, Y., and Xiao, B. (2024). A Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial Attacks. ACM Comput. Surv., 56.","DOI":"10.1145\/3636551"},{"key":"ref_77","doi-asserted-by":"crossref","unstructured":"Liu, B., Lv, N., Guo, Y., and Li, Y. (2024). Recent advances on federated learning: A systematic survey. Neurocomputing, 597.","DOI":"10.1016\/j.neucom.2024.128019"},{"key":"ref_78","doi-asserted-by":"crossref","first-page":"1405","DOI":"10.1049\/cmu2.12759","article-title":"Survey of Research on Confidential Computing","volume":"18","author":"Feng","year":"2024","journal-title":"IET Commun."},{"key":"ref_79","doi-asserted-by":"crossref","unstructured":"Sabt, M., Achemlal, M., and Bouabdallah, A. (2015, January 20\u201322). Trusted Execution Environment: What It Is, and What It Is Not. Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA, Helsinki, Finland.","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref_80","unstructured":"Wang, Q., and Oswald, D. (2024). Confidential Computing on Heterogeneous CPU-GPU Systems. arXiv."},{"key":"ref_81","doi-asserted-by":"crossref","unstructured":"Addula, S.R., Meesala, M.K., Ravipati, P., and Sajja, G.S. (2025). A Hybrid Autoencoder and Gated Recurrent Unit Model Optimized by Honey Badger Algorithm for Enhanced Cyber Threat Detection in IoT Networks. Secur. Priv., 8.","DOI":"10.1002\/spy2.70086"},{"key":"ref_82","doi-asserted-by":"crossref","unstructured":"Vassilev, A., Oprea, A., Fordyce, A., and Anderson, H. (2025). Adversarial Machine Learning: A Taxonomy and Terminology, National Institute of Standards and Technology. NIST AI Technical Report AI 100-2e202.","DOI":"10.6028\/NIST.AI.100-2e2023"},{"key":"ref_83","doi-asserted-by":"crossref","first-page":"1095","DOI":"10.1109\/COMST.2023.3244674","article-title":"Security and Privacy on 6G Network Edge: A Survey","volume":"25","author":"Mao","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_84","doi-asserted-by":"crossref","unstructured":"Ferrag, M.A., Friha, O., Kantarci, B., Tihanyi, N., Cordeiro, L., Debbah, M., Hamouda, D., Al-Hawawreh, M., and Choo, K.K.R. (2023). Edge Learning for 6G-enabled Internet of Things: A Comprehensive Survey of Vulnerabilities, Datasets, and Defenses. arXiv.","DOI":"10.1109\/COMST.2023.3317242"},{"key":"ref_85","doi-asserted-by":"crossref","unstructured":"Qureshi, A.R., Asensio, A., Imran, M., Garcia, J., and Masip-Bruin, X. (2025). A Survey on Security-Enhancing Digital Twins: Models, applications and tools. Comput. Commun., 238.","DOI":"10.1016\/j.comcom.2025.108158"},{"key":"ref_86","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MITP.2024.3486115","article-title":"Industrial-Internet-of-Things-Based Digital Twin and Cybersecurity","volume":"26","author":"Odeh","year":"2024","journal-title":"IT Prof."},{"key":"ref_87","doi-asserted-by":"crossref","first-page":"2337","DOI":"10.1109\/COMST.2022.3202047","article-title":"A Survey on Metaverse: Fundamentals, Security, and Privacy","volume":"25","author":"Wang","year":"2023","journal-title":"IEEE Commun. Surv. Tutor."},{"key":"ref_88","doi-asserted-by":"crossref","first-page":"21","DOI":"10.56553\/popets-2024-0003","article-title":"SoK: Data Privacy in Virtual Reality","volume":"2024","author":"Garrido","year":"2024","journal-title":"Proc. Priv. Enhancing Technol."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Birkholz, H., Thaler, D., Richardson, M., Smith, N., Moran, B., and Eckel, M. (2023). RFC 9334: Remote Attestation Procedures (RATS) Architecture, Internet Engineering Task Force (IETF).","DOI":"10.17487\/RFC9334"},{"key":"ref_90","doi-asserted-by":"crossref","unstructured":"Lundblade, L., Mandyam, G., O\u2019Donoghue, J., and Wallace, C. (2025). RFC 9711: The Entity Attestation Token (EAT), Internet Engineering Task Force (IETF).","DOI":"10.17487\/RFC9711"},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Pan, K., Ong, Y.S., Gong, M., Li, H., Qin, A.K., and Gao, Y. (2024). Differential Privacy in Deep Learning: A Literature Survey. Neurocomputing, 589.","DOI":"10.1016\/j.neucom.2024.127663"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Demelius, L., Kern, R., and Tr\u00fcgler, A. (2025). Recent Advances of Differential Privacy in Centralized Deep Learning: A Survey. ACM Comput. Surv., 57.","DOI":"10.1145\/3712000"},{"key":"ref_93","doi-asserted-by":"crossref","unstructured":"Wang, Y., Liu, Y., and Chen, X. (2024). Scenario-based Adaptations of Differential Privacy: A Survey. ACM Comput. Surv., 56.","DOI":"10.1145\/3651153"},{"key":"ref_94","unstructured":"Newhouse, W., Souppaya, M., Barker, W., Brown, C., Kampanakis, P., Goodman, J., Prat, J., Gray, J., Ounsworth, M., and Viana, C. (2025, September 02). SP 1800-38B: Migration to Post-Quantum Cryptography\u2014Quantum Readiness: Cryptographic Discovery, Available online: https:\/\/www.nccoe.nist.gov\/projects\/migration-post-quantum-cryptography."},{"key":"ref_95","unstructured":"Newhouse, W., Souppaya, M., Barker, W., Brown, C., Kampanakis, P., Manzano, M., McGrew, D., Dames, A., Soukharev, V., and Lafrance, P. (2025, September 02). SP 1800-38C: Migration to Post-Quantum Cryptography\u2014Approaches for Discovery and Remediation, Available online: https:\/\/www.nccoe.nist.gov\/projects\/migration-post-quantum-cryptography."},{"key":"ref_96","unstructured":"National Security Agency (NSA) (2025, September 02). NSA Releases Future Quantum-Resistant Algorithm Requirements for National Security Systems (CNSA 2.0), Available online: https:\/\/www.nsa.gov\/Press-Room\/Press-Releases-Statements\/Press-Release-View\/Article\/xxxx\/."},{"key":"ref_97","unstructured":"National Security Agency (NSA) (2025, September 02). Commercial National Security Algorithm Suite 2.0 (CNSA 2.0): Algorithms and Guidance, Available online: https:\/\/www.nsa.gov\/Press-Room\/Press-Releases-Statements\/."},{"key":"ref_98","unstructured":"Liu, T., Ramachandran, G., and Jurdak, R. (2024). Post-Quantum Cryptography for Internet of Things: A Survey. arXiv."}],"container-title":["Electronics"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/2079-9292\/15\/2\/399\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,16]],"date-time":"2026-01-16T13:40:17Z","timestamp":1768570817000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/2079-9292\/15\/2\/399"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,1,16]]},"references-count":98,"journal-issue":{"issue":"2","published-online":{"date-parts":[[2026,1]]}},"alternative-id":["electronics15020399"],"URL":"https:\/\/doi.org\/10.3390\/electronics15020399","relation":{},"ISSN":["2079-9292"],"issn-type":[{"value":"2079-9292","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026,1,16]]}}}