setting. This work mitigated the fundamental
shortcomings of the previous designs, by presenting a
lightweight, adaptive and multilayer security
architecture developed for heterogeneous based IoT
environments. By leveraging a proprietary integration
of lightweight cryptography, behavior based
anomaly detection, secure firmware validation and a
managed security service, the reference design
protects against the multitude of threats impacting
customers at the device, edge and cloud.
Results across various IoT domains (i.e., smart
home, industrial monitoring) verified that the model
was able to achieve high detection accuracy while
keeping the latency low and operating under strict
power and memory budgets. The practicality and
future-readiness of the framework are also shown by
the ability of the framework to make the device
resilent through firmware tampering, real-time
detection of abnormal behaviour of the system and
dynamic approach on security based on the available
resources. And, with post-quantum cryptographic
considerations, resilience to attack vectors of the
future.
Unlike many existing solutions, which are
impractical on resource-constrained devices finally
observation and only useful in specialized domains,
this work provides a comprehensive, deployable,
domain-independent solution that can be
straightforwardly expanded or incorporated to
existing IoT frameworks. By addressing the
deficiencies exposed in existing work namely, the
lack of device-level enforcement, the excessive
resource consumption and the integrity of update
dissemination—this work paves the way towards the
creation of smarter, safer, and resilient connected
environments.
REFERENCES
Akram, F. (2024). Securing Internet of Things (IoT)
Devices: Challenges and Best Practices. ResearchGate.
ResearchGate
Al-Ali, A. R., & Zualkernan, I. A. (2023). A survey on IoT
security: Threats, vulnerabilities, and countermeasures.
Journal of Network and Computer Applications, 200,
103348.
Bharati, S., & Podder, P. (2022). Machine and deep learning
for IoT security and privacy: Applications, challenges,
and future directions. arXiv. arXiv
Buyya, R., Singh, N., & Kim, H. (2024). Securing cloud-
based Internet of Things: Challenges and mitigations.
MDPI Sensors, 25(1), 79. arXiv+1MDPI+1
Compunnel Digital. (2024). Addressing 2024’s IoT security
challenges within compliance frameworks. Compunnel.
Compunnel
Farooq, M. U., Waseem, M., Khairi, A., & Mazhar, S.
(2023). A critical analysis on the security concerns of
Internet of Things (IoT). International Journal of
Computer Applications, 182(1), 1-6.
Gubbi, J., Buyya, R., Marusic, S., & Palaniswami, M.
(2025). Internet of Things (IoT): A vision, architectural
elements, and future directions. Future Generation
Computer Systems, 79, 164-180.
Hassan, Q. F., & Khan, M. A. (2024). IoT security: Review,
blockchain solutions, and open challenges. Future
Generation Computer Systems, 82, 395-411.Wikipedia
Islam, S. R., Kwak, D., Kabir, M. H., Hossain, M., & Kwak,
K. S. (2023). The Internet of Things for health care: A
comprehensive survey. IEEE Access, 3, 678-708.
Javed, M. A., & Abbas, H. (2022). A survey on security and
privacy issues in Internet-of-Things. Journal of Network
and Computer Applications, 88, 1-15.
Khan, R., Khan, S. U., Zaheer, R., & Khan, S. (2021). Future
Internet: The Internet of Things architecture, possible
applications and key challenges. In 2012 10th
International Conference on Frontiers of Information
Technology (pp. 257-260). IEEE.
Kumar, P., & Tripathi, R. (2023). Security and privacy
issues in IoT: A comprehensive survey. Computer
Networks, 149, 1-23.
Li, S., Tryfonas, T., & Li, H. (2022). The Internet of Things:
A security point of view. Internet Research, 26(2), 337-
359.
MobiDev. (2024). How to mitigate IoT security threats with
AI and ML in 2025. MobiDev. MobiDev
Mosteiro-Sanchez, A., Barcelo, M., Astorga, J., & Urbieta,
A. (2022). Securing IIoT using defence-in-depth:
Towards an end-to-end secure Industry 4.0. arXiv. arXiv
Nakamura, E. F., Loureiro, A. A. F., & Fraga, J. S. (2023).
Information fusion for wireless sensor networks:
Methods, models, and classifications. ACM Computing
Surveys, 39(3), 1-55.
Panasonic. (2023). Panasonic warns that Internet-of-Things
malware attack cycles are accelerating. Wired. WIRED
Raza, S., Wallgren, L., & Voigt, T. (2021). SVELTE: Real-
time intrusion detection in the Internet of Things. Ad
Hoc Networks, 11(8), 2661-2674.
Schöttle, P., Janetschek, M., Merkle, F., Nocker, M., &
Egger, C. (2025). Large-scale (semi-)automated security
assessment of consumer IoT devices: A roadmap. arXiv.
arXiv
Shaik, A., & Park, S. (2022). One of 5G's biggest features is
a security minefield. Wired. WIRED
Sharma, V., You, I., & Pau, G. (2023). Secure and efficient
data transmission for smart agriculture by integrating
fog computing and blockchain technology. IEEE
Access, 5, 5804-5815.
Singh, N., Buyya, R., & Kim, H. (2024). Securing cloud-
based Internet of Things: Challenges and mitigations.
arXiv. arXiv+1MDPI+1
StationX. (2025). IoT security challenges (most critical risk
of 2025). StationX