[Home ] [Archive]   [ فارسی ]  
:: Main :: About :: Current Issue :: Archive :: Search :: Submit :: Contact ::
Main Menu
Home::
Journal Information::
Articles archive::
For Authors::
For Reviewers::
Registration::
Contact us::
Site Facilities::
::
Search in website

Advanced Search
..
Receive site information
Enter your Email in the following box to receive the site news and information.
..
:: Volume 4, Issue 8 (9-2025) ::
3 2025, 4(8): 49-62 Back to browse issues page
Challenges and Solutions for IoT Security: A Comprehensive Review
Hamid Yasinian , Mohammad Mehdi Shirmohammadi
Abstract:   (5 Views)
The rapid expansion of the Internet of Things (IoT) and its integration into various domains has established security challenges as one of the most significant obstacles to the sustainable development of this technology. The heterogeneous architecture, limited processing resources, lack of standardized frameworks, and diversity of communication protocols have rendered IoT devices vulnerable to cyber threats such as Denial-of-Service (DoS/DDoS) attacks, unauthorized access, spoofing, privacy breaches, and IoT-specific malware. This study investigates the principal security challenges in IoT and analyzes existing countermeasures, including lightweight cryptography, multi-factor authentication (MFA), active monitoring of IoT networks, blockchain technology for decentralized security, and artificial intelligence-based algorithms for anomaly and cyber threat detection. The results indicate that a multi-layered security approach—combining "Security by Design," continuous update management, dynamic access control, and compliance with international standards—can help mitigate security risks in this domain. However, challenges such as the scalability of security solutions, the high cost of implementing advanced protocols, the complexity of real-time monitoring, and the need for unified global regulations persist. Therefore, future research should focus on developing optimized encryption algorithms, enhancing machine learning-based threat detection capabilities, and establishing standardized security frameworks for large-scale deployment.
 
Keywords: Internet of Things (IoT), Cybersecurity, Multi-Factor Authentication, Blockchain, Lightweight Cryptography, Threat Detection, Cyber Attacks
Full-Text [PDF 560 kb]   (11 Downloads)    
Type of Study: case report | Subject: Special
Received: 2025/05/31 | Accepted: 2025/09/1 | Published: 2025/09/1
References
1. R. H. Weber, "Internet of Things – New security and privacy challenges," Computer Law & Security Review, vol. 26, no. 1, pp. 23–30, Jan. 2010. doi: 10.1016/j.clsr.2009.11.008
2. M. Ammar, G. Russello, and B. Crispo, "Internet of Things: A survey on the security of IoT frameworks," Journal of Information Security and Applications, vol. 38, pp. 8–27, Feb. 2018. doi: 10.1016/j.jisa.2017.11.002
3. S. Kazemian and M. M. ShirMohammadi, "Internet of Things and Distributed Detection of Identity Spoofing," in Proceedings of the 3rd National Conference on Innovation and Research in Electrical Engineering, Computer Science, and Mechanics, vol. 3, 2017. [Google Scholar]
4. M. M. ShirMohammadi and I. Moradi, "Detection of DDoS Attacks with HTTP Flood Method in WAN Networks," in Proceedings of the 2nd International Conference on Artificial Intelligence and Future Technologies, vol. 2, Babol, Iran: Babol Noshirvani University of Technology, 2024. [Google Scholar]
5. M. Ghahremani and M. M. ShirMohammadi, "A Method for Mitigating DDoS Attacks in Wireless Broadband Multimedia Networks," Journal of Information Technology and Network Security, vol. 2, no. 1, 2024. [Online]. Available: https://sanad.iau.ir/Journal/joins/Article/1126057 [Google Scholar]
6. M. A. Khan and K. Salah, "IoT security: Review, blockchain solutions, and open challenges," Future Generation Computer Systems, vol. 82, pp. 380–411, May 2018. doi: 10.1016/j.future.2017.11.022
7. M. Tawalbeh, A. B. Mohammad, Q. H. Al-Turjman, and H. M. Mohamad, "IoT privacy and security: Challenges and solutions," Applied Sciences, vol. 10, no. 12, pp. 4102, Jun. 2020. doi: 10.3390/app10124102
8. N. Gluhak et al., "A survey on facilities for experimental internet of things research," IEEE Communications Magazine, vol. 49, no. 11, pp. 58–67, Nov. 2011. doi: 10.1109/MCOM.2011.6069710
9. X. Lin, J. Li, R. Lu, X. Liang, and X. Shen, "Access control in the internet of things: A survey," Computer Networks, vol. 112, pp. 111–125, Jan. 2017. doi: 10.1016/j.comnet.2016.10.017
10. A. Ezzatie and M. M. ShirMohammadi, "A novel approach to increase the lifetime and security of wireless sensor networks using a combination of particle swarm optimization algorithms and K-Mean combined with an …," Intelligent Knowledge Exploration and Processing, vol. 5, no. 16, p. e226723, May 2025.
11. L. Atzori, A. Iera, and G. Morabito, "The internet of things: A survey," Computer Networks, vol. 54, no. 15, pp. 2787–2805, Oct. 2010. doi: 10.1016/j.comnet.2010.05.010
12. J. Granjal, E. Monteiro, and J. S. Silva, "Security for the Internet of Things: A Survey of Existing Protocols and Open Research Issues," IEEE Communications Surveys & Tutorials, vol. 17, no. 3, pp. 1294–1312, 2015. doi: 10.1109/COMST.2015.2388550
13. J. Singh, N. Kumar, and R. Shorey, "Threat taxonomy and security requirements for the Internet of Things," in Proceedings of the 2015 IEEE International Conference on Communication Workshop (ICCW), London, UK, 2015, pp. 414–419. doi: 10.1109/ICCW.2015.7247195
14. M. Mozaffari, M. Zamani, M. M. ShirMohammadi, S. Taheri, and M. Chahardooli, "A Novel Method for Generating Very Large Prime Numbers to Enhance the Security of the RSA Encryption Algorithm," in *Proceedings of the 2nd National Conference on E-City*, vol. 2, Islamic Azad University, Hamadan, 2014. [Google Scholar]
15. F. Rajabi and M. M. ShirMohammadi, "Improvement and Implementation of the Advanced Encryption Standard (AES) Algorithm for E-Health Applications," in Proceedings of the 1st National Conference on New Research in Engineering and Applied Sciences, vol. 1, 2016. [Google Scholar]
16. M. M. Shirmohammadi, “The Traffic Congestion Analysis Using Traffic Congestion Index and Artificial Neural Network in Main Streets of Electronic City (Case Study: Hamedan City),” Programming and Computer Software, vol. 46, no. 6, pp. 433–442, 2020. [Google Scholar]
17. M. M. Shirmohammadi and M. Esmaeilpour, “Wavelet neural network and complete ensemble empirical decomposition method to traffic control prediction,” Journal of Intelligent & Fuzzy Systems, vol. 43, no. 4, pp. 1–13, 2022. [Google Scholar]
18. M. Esmaeilpour and M. M. Shirmohammadi, "Analysis of traffic congestion in main streets of electronic city using traffic congestion index and artificial neural network (case study: Hamedan city)," Proceedings of the Institute for System Programming of the RAS, vol. 32, no. 3, pp. 131-146, 2020. [Google Scholar]
Add your comments about this article
Your username or Email:

CAPTCHA


XML   Persian Abstract   Print


Download citation:
BibTeX | RIS | EndNote | Medlars | ProCite | Reference Manager | RefWorks
Send citation to:

Yasinian H, Shirmohammadi M M. Challenges and Solutions for IoT Security: A Comprehensive Review. 3 2025; 4 (8) :49-62
URL: http://jiis.iauh.ac.ir/article-1-48-en.html


Rights and permissions
Creative Commons License This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Volume 4, Issue 8 (9-2025) Back to browse issues page
فصلنامه سیستم های اطلاعاتی هوشمند Intelligent Information Systems Journal
Persian site map - English site map - Created in 0.05 seconds with 37 queries by YEKTAWEB 4718