Defense and Security Mechanisms in the Internet of Things: A Review

The Internet of Things (IoT) transforms traditional technology by introducing smart devices into almost every field, enabling real-time monitoring and automation. Despite the obvious benefits, the rapid deployment of IoT presents numerous security challenges, including vulnerabilities in network att...

Full description

Saved in:
Bibliographic Details
Main Authors: Sabina Szymoniak, Jacek Piątkowski, Mirosław Kurkowski
Format: Article
Language:English
Published: MDPI AG 2025-01-01
Series:Applied Sciences
Subjects:
Online Access:https://www.mdpi.com/2076-3417/15/2/499
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832589249612873728
author Sabina Szymoniak
Jacek Piątkowski
Mirosław Kurkowski
author_facet Sabina Szymoniak
Jacek Piątkowski
Mirosław Kurkowski
author_sort Sabina Szymoniak
collection DOAJ
description The Internet of Things (IoT) transforms traditional technology by introducing smart devices into almost every field, enabling real-time monitoring and automation. Despite the obvious benefits, the rapid deployment of IoT presents numerous security challenges, including vulnerabilities in network attacks and communication protocol weaknesses. While several surveys have addressed these aspects, there remains a lack of understanding of integrating all potential defense mechanisms, such as intrusion detection systems (IDSs), anomaly detection frameworks, and authentication protocols, into a comprehensive security framework. To overcome this, the following survey aims to critically review existing security mechanisms in IoT environments and significantly fill these gaps. In particular, this paper reviews state-of-the-art approaches for intrusion detection, key agreement protocols, and anomaly detection systems, pointing out their advantages and disadvantages and identifying the gaps in each field requiring more research. We identify innovative strategies by systematically analysing existing approaches and propose a roadmap for enhancing IoT security. This work contributes to the field by offering a fresh perspective on defense mechanisms and delivering actionable insights for researchers and practitioners securing IoT ecosystems.
format Article
id doaj-art-3f5f2856cccb44cdbb060175d6f65dc3
institution Kabale University
issn 2076-3417
language English
publishDate 2025-01-01
publisher MDPI AG
record_format Article
series Applied Sciences
spelling doaj-art-3f5f2856cccb44cdbb060175d6f65dc32025-01-24T13:19:35ZengMDPI AGApplied Sciences2076-34172025-01-0115249910.3390/app15020499Defense and Security Mechanisms in the Internet of Things: A ReviewSabina Szymoniak0Jacek Piątkowski1Mirosław Kurkowski2Department of Computer Science, Czestochowa University of Technology, 42-201 Częstochowa, PolandDepartment of Computer Science, Czestochowa University of Technology, 42-201 Częstochowa, PolandInstitute of Computer Science, Cardinal St. Wyszynski University, 01-815 Warsaw, PolandThe Internet of Things (IoT) transforms traditional technology by introducing smart devices into almost every field, enabling real-time monitoring and automation. Despite the obvious benefits, the rapid deployment of IoT presents numerous security challenges, including vulnerabilities in network attacks and communication protocol weaknesses. While several surveys have addressed these aspects, there remains a lack of understanding of integrating all potential defense mechanisms, such as intrusion detection systems (IDSs), anomaly detection frameworks, and authentication protocols, into a comprehensive security framework. To overcome this, the following survey aims to critically review existing security mechanisms in IoT environments and significantly fill these gaps. In particular, this paper reviews state-of-the-art approaches for intrusion detection, key agreement protocols, and anomaly detection systems, pointing out their advantages and disadvantages and identifying the gaps in each field requiring more research. We identify innovative strategies by systematically analysing existing approaches and propose a roadmap for enhancing IoT security. This work contributes to the field by offering a fresh perspective on defense mechanisms and delivering actionable insights for researchers and practitioners securing IoT ecosystems.https://www.mdpi.com/2076-3417/15/2/499Internet of Thingssecurity protocolsintrusion detection systemsintrusion prevention systems
spellingShingle Sabina Szymoniak
Jacek Piątkowski
Mirosław Kurkowski
Defense and Security Mechanisms in the Internet of Things: A Review
Applied Sciences
Internet of Things
security protocols
intrusion detection systems
intrusion prevention systems
title Defense and Security Mechanisms in the Internet of Things: A Review
title_full Defense and Security Mechanisms in the Internet of Things: A Review
title_fullStr Defense and Security Mechanisms in the Internet of Things: A Review
title_full_unstemmed Defense and Security Mechanisms in the Internet of Things: A Review
title_short Defense and Security Mechanisms in the Internet of Things: A Review
title_sort defense and security mechanisms in the internet of things a review
topic Internet of Things
security protocols
intrusion detection systems
intrusion prevention systems
url https://www.mdpi.com/2076-3417/15/2/499
work_keys_str_mv AT sabinaszymoniak defenseandsecuritymechanismsintheinternetofthingsareview
AT jacekpiatkowski defenseandsecuritymechanismsintheinternetofthingsareview
AT mirosławkurkowski defenseandsecuritymechanismsintheinternetofthingsareview