Skip to main content
. 2024 Nov 11;24(22):7209. doi: 10.3390/s24227209

Table 5.

Summary of key research strategies and trends.

Main Contributions Trends Application Area Reference
Predictive analytics, threat detection, big data architecture, protecting sensitive data, and assessment framework. Closing security weaknesses and boosting stakeholder trust. Industrial networks [10]
Energy efficiency, flexibility across protocol levels, LoRaWAN, and cross-layer optimization. Improves performance and optimizes the protocol LPWANs and IoT applications [19]
Introduces a hybrid approach to thorough risk identification that combines PMBOK, HAZOP, NIST, and ISO 31000 techniques to improve analysis and cut down on redundancy. Minimizes risk redundancy and provides thorough evaluation. Cyber-physical systems [11]
Cross-layer security, data accuracy, social IoT (SIoT), and graph-powered learning techniques. Optimizes energy efficiency and improves network navigability. SIoT ecosystems. [18]
Information-theoretic security, random key encryption, lightweight encryption, and key management. Effective and secure, appropriate for IoT with low resources. Cyber-Physical Systems (CPS) and IoT [53]
Ensemble learning, IoT-Sentry, Cooja IoT simulator analysis, and cross-layer intrusion detection. Excellent detection precision and low overhead. Standardized networks for IoT [54]
IoT authentication techniques, hierarchical classification, centralization, and distribution. Thorough analysis that promotes more study. Authentication of IoT [56]
Performance improvement, smart city applications, and lightweight mutual authentication. Combines efficiency and security, and it performs better than current protocols. Water, traffic, and smart city management [58]
Quantum walk, device identifier encoding, cross-layer authentication, and privacy-preserving protocols. Low latency, high privacy and security. 5G networks and IIoT [59]
Web-based IDS-AC, real-world attack detection, machine learning, and Honeynet architecture. Strong attack alerts, user self-updating Cybersecurity and industrial networks. [62]
Evaluation of IoT security research, risks, countermeasures, and prospects Thorough summary that directs further study. Development of IoT and security solutions [63]
IoT network technologies in delay, efficient and secured protocol for emerging IoT network applications protocol (ESPINA), key-renewal approach improves security while lowering computational costs. Energy efficiency, 6G wireless access, better than existing procedures, in line with 6G wireless communications standards, and secure and energy-efficient protocols. IoT in healthcare, embedded systems, and applications that are sensitive to security. [73]
Attack detection, secure clustering, lightweight cryptography, and the cross-layer and cryptography-based secure routing (CLCSR) protocol. Improves network efficiency and protects privacy. Smart cities, e-healthcare [76]
Functions that are physically unclonable, key agreement, hierarchical authentication, and cryptography of elliptic curves. Secure, effective, and resistant to frequent attacks, IoT and Industry 4.0 settings. [78]