A Comprehensive Review of Cybersecurity Measures in the IoT Era
Downloads
Background. This research presents a comprehensive review of cybersecurity measures in the Internet of Things (IoT) era. The primary focus is on elucidating the evolving landscape of IoT cybersecurity, with specific attention to the integration of Artificial Intelligence (AI), machine learning, and risk management. The study aims to identify key advancements, challenges, and opportunities in securing interconnected devices, offering valuable insights for researchers, policymakers, and industry professionals.
Purpose. Employing a hybrid methodological design that combines elements from narrative synthesis and heuristic analysis, this study utilizes purposive and snowball sampling techniques to select diverse and pertinent sources. The integration of semantic analysis, leveraging natural language processing algorithms, enriches data interpretation. Collaborative intelligence from cybersecurity, machine learning, and IoT experts enhances the study's perspective. A proprietary algorithm, incorporating machine learning principles, enhances data collection efficiency.
Method. The synthesis reveals a dynamic landscape marked by the symbiotic relationship between AI and IoT, fortifying defenses against cyber threats. Machine learning emerges as a potent ally, providing robust solutions for threat detection. The study identifies challenges in implementing cybersecurity measures in the IoT landscape, including data privacy, scalability, and regulatory compliance.
Results. In conclusion, the review emphasizes the need for proactive and adaptive security strategies in the IoT era, highlighting the role of AI and collaborative interdisciplinary approaches. The study provides a roadmap for future research, policy formulation, and industry practices to fortify the security posture of the IoT ecosystem.
Conclusion. This study has comprehensive review of IoT cybersecurity illuminates a dynamic landscape marked by the symbiotic relationship between Artificial Intelligence (AI) and the Internet of Things (IoT). The integration of AI signifies a paradigm shift towards proactive and adaptive security strategies, enhancing the resilience of IoT ecosystems against evolving cyber threats.
Andrade, R.O., Yoo, S.G., Tello-Oquendo, L., & Ortiz-Garces, I. (2020). A Comprehensive Study of the IoT Cybersecurity in Smart Cities. IEEE Access, 8, 228922–228941. https://doi.org/10.1109/ACCESS.2020.3041422
Atlam, H.F., & Wills, G.B. (2019). An efficient security risk estimation technique for Risk-based access control model for IoT. Internet of Things, 6, 100052. https://doi.org/10.1016/j.iot.2019.100052
Boeckl, K., Fagan, M., Fisher, W., Lefkovitz, N., Megas, K.N., Nadeau, E., O’Rourke, D.G., Piccarreta, B., & Scarfone, K. (2019). Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks; US Department of Commerce, National Institute of Standards and Technology: Gaithersburg, MD, USA. https://doi.org/10.6028/NIST.IR.8228
Hakimi, M., Mohammad Mustafa Quchi, & Abdul Wajid Fazil. (2024). Human factors in cybersecurity: an in depth analysis of user centric studies. Jurnal Ilmiah Multidisiplin Indonesia (JIM-ID), 3(01), 20–33. https://doi.org/10.58471/esaprom.v3i01.3832
Almomani, O., Almaiah, M.A., Alsaaidah, A., Smadi, S., Mohammad, A.H., & Althunibat, A. (2021). Machine learning classifiers for network intrusion detection system: Comparative study. In Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 440–445. https://ieeexplore.ieee.org/abstract/document/9491770/
Bubukayr, M.A., & Almaiah, M.A. (2021). Cybersecurity concerns in smartphones and applications: A survey. In Proceedings of the 2021 International Conference on Information Technology (ICIT), Amman, Jordan, 14–15 July 2021; pp. 725–731. https://doi.org/10.1109/ICIT52682.2021.9491691
Fazil, A. W., Hakimi, M., Akbari, R., Quchi, M. M., & Khaliqyar, K. Q. (2023). Comparative Analysis of Machine Learning Models for Data Classification: An In-Depth Exploration. Journal of Computer Science and Technology Studies, 5(4), 160-168. http://dx.doi.org/10.32996/jcsts.2023.5.4.16
Fazil, A. W., Hakimi, M., Sajid, S., Quchi, M. M., & Khaliqyar, K. Q. (2023). Enhancing Internet Safety and Cybersecurity Awareness among Secondary and High School Students in Afghanistan: A Case Study of Badakhshan Province. American Journal of Education and Technology (AJET), 2(4). ISSN: 2832-9481. http://dx.doi.org/10.54536/ajet.v2i4.2248
Gurunath, R., Agarwal, M., Nandi, A., & Samanta, D. (2018). An Overview: Security Issue in IoT Network. In Proceedings of the 2018 2nd International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India, 30–31 August 2018; pp. 104–107. https://doi.org/10.1109/I-SMAC.2018.8653728
Wirkuttis, N., & Klein, H. (2017). Artificial intelligence in cybersecurity. Cyber, Intelligence, and Security, 1(1), 103-119.
Sarker, I. H., Furhad, M. H., & Nowrozy, R. (2021). Ai-driven cybersecurity: an overview, security intelligence modeling and research directions. SN Computer Science, 2, 1-18.
https://link.springer.com/article/10.1007/s42979-021-00557-0
Hasas, A., Sadaat, S. N., Hakimi, M., & Quchi, M. M. (2024). Interactive Learning in Afghanistan: Feasibility of Implementing IoT Connected Devices in Classrooms. American Journal of Smart Technology and Solutions, 3(1), 8–16. https://doi.org/10.54536/ajsts.v3i1.2342
Islam, M.R., & Aktheruzzaman, K.M. (2020). An Analysis of Cybersecurity Attacks against Internet of Things and Security Solutions. Journal of Computer Communications, 8, 11–25. https://doi.org/10.4236/jcc.2020.84002
Keshav, M., Julien, L., & Miezel, J. (2022). The Role of Technology In Era 5.0 In The Development Of Arabic Language In The World Of Education. Journal International of Lingua and Technology, 1(2), 79–98. https://doi.org/10.55849/jiltech.v1i2.85
Kuzlu, M., Fair, C., & Guler, O. (2021). Role of Artificial Intelligence in the Internet of Things (IoT) cybersecurity. Discover Internet of Things, 1, 7. https://doi.org/10.1007/s43926-020-00003-1
Abdullah, A., Hamad, R., Abdulrahman, M., Moala, H., & Elkhediri, S. (2019, May). CyberSecurity: a review of internet of things (IoT) security issues, challenges and techniques. In 2019 2nd International Conference on Computer Applications & Information Security (ICCAIS) (pp. 1-6). IEEE. https://doi.org/10.1109/CAIS.2019.8769560
Lee, I. (2020). Internet of Things (IoT) Cybersecurity: Literature Review and IoT Cyber Risk Management. Future Internet, 12, 157. https://doi.org/10.3390/fi12090157
Liao, B., Ali, Y., Nazir, S., He, L., & Khan, H.U. (2020). Security Analysis of IoT Devices by Using Mobile Computing: A Systematic Literature Review. IEEE Access, 8, 120331–120350. https://doi.org/10.1109/ACCESS.2020.3000666
Nieto, A., & Rios, R. (2019). Cybersecurity profiles based on human-centric IoT devices. Human-Centric Computing and Information Sciences, 9, 39. https://doi.org/10.1186/s13673-019-0195-2
Radanliev, P., De Roure, D., Maple, C., Nurse, J.R., Nicolescu, R., & Ani, U. (2019). Cyber Risk in IoT Systems. University of Oxford Combined Work. Pap. Proj. Rep. Prep. PETRAS Natl. Cent. Excell. Cisco Res. Cent., 169701, 1–27. https:// doi: 10.20944/preprints201903.0104.v1
Radanliev, P., De Roure, D.C., Nurse, J.R.C., Mantilla Montalvo, R., Cannady, S., Santos, O., Maddox, L.T., Burnap, P., & Maple, C. (2020). Cyber Risk Impact Assessment-Assessing the Risk from the IoT to the Digital Economy. SN Applied Sciences, 2, 1–12. https://doi.org/10.1007/s42452-019-1972-4
Strecker, S., Van Haaften, W., & Dave, R. (2021). An Analysis of IoT Cyber Security Driven by Machine Learning. In Proceedings of the International Conference on Communication and Computational Technologies: ICCCT 2021; Springer: Singapore; pp. 725–753. https://doi.org/10.1007/978-981-16-0388-0_58
Wahab, A., Ahmad, O., Muhammad, M., & Ali, M. (2017). A Comprehensive Analysis on the Security Threats and their Countermeasures of IoT. International Journal of Advanced Computer Science and Applications, 8(8), 489–501. https://doi.org/10.14569/IJACSA.2017.080874
Copyright (c) 2024 Ezatullah Ahmady, Abdul Rahman Mojadadi, Musawer Hakimi

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.