Predictive analytics, threat detection, big data architecture, protecting sensitive data, and assessment framework. |
Closing security weaknesses and boosting stakeholder trust. |
Industrial networks |
[10] |
Energy efficiency, flexibility across protocol levels, LoRaWAN, and cross-layer optimization. |
Improves performance and optimizes the protocol |
LPWANs and IoT applications |
[19] |
Introduces a hybrid approach to thorough risk identification that combines PMBOK, HAZOP, NIST, and ISO 31000 techniques to improve analysis and cut down on redundancy. |
Minimizes risk redundancy and provides thorough evaluation. |
Cyber-physical systems |
[11] |
Cross-layer security, data accuracy, social IoT (SIoT), and graph-powered learning techniques. |
Optimizes energy efficiency and improves network navigability. |
SIoT ecosystems. |
[18] |
Information-theoretic security, random key encryption, lightweight encryption, and key management. |
Effective and secure, appropriate for IoT with low resources. |
Cyber-Physical Systems (CPS) and IoT |
[53] |
Ensemble learning, IoT-Sentry, Cooja IoT simulator analysis, and cross-layer intrusion detection. |
Excellent detection precision and low overhead. |
Standardized networks for IoT |
[54] |
IoT authentication techniques, hierarchical classification, centralization, and distribution. |
Thorough analysis that promotes more study. |
Authentication of IoT |
[56] |
Performance improvement, smart city applications, and lightweight mutual authentication. |
Combines efficiency and security, and it performs better than current protocols. |
Water, traffic, and smart city management |
[58] |
Quantum walk, device identifier encoding, cross-layer authentication, and privacy-preserving protocols. |
Low latency, high privacy and security. |
5G networks and IIoT |
[59] |
Web-based IDS-AC, real-world attack detection, machine learning, and Honeynet architecture. |
Strong attack alerts, user self-updating |
Cybersecurity and industrial networks. |
[62] |
Evaluation of IoT security research, risks, countermeasures, and prospects |
Thorough summary that directs further study. |
Development of IoT and security solutions |
[63] |
IoT network technologies in delay, efficient and secured protocol for emerging IoT network applications protocol (ESPINA), key-renewal approach improves security while lowering computational costs. |
Energy efficiency, 6G wireless access, better than existing procedures, in line with 6G wireless communications standards, and secure and energy-efficient protocols. |
IoT in healthcare, embedded systems, and applications that are sensitive to security. |
[73] |
Attack detection, secure clustering, lightweight cryptography, and the cross-layer and cryptography-based secure routing (CLCSR) protocol. |
Improves network efficiency and protects privacy. |
Smart cities, e-healthcare |
[76] |
Functions that are physically unclonable, key agreement, hierarchical authentication, and cryptography of elliptic curves. |
Secure, effective, and resistant to frequent attacks, |
IoT and Industry 4.0 settings. |
[78] |