Analysis of Emerging Approaches in Cybersecurity for Internet of Things (IoT) Networks with an Emphasis on Smart Urban and Domestic Infrastructures

Document Type : Review article

Author

Department of Electrical Engineering,University of Guilan,Rasht,guilan,Iran

Abstract

Abstract The rapid expansion of Internet of Things (IoT) technologies and their widespread integration into smart urban and domestic infrastructures have elevated cybersecurity challenges to a top research and industrial priority. The distributed nature, limited computational resources, heterogeneous communication protocols, and large-scale deployment of IoT devices significantly increase the attack surface and demand novel security approaches capable of addressing sophisticated threats such as code injection attacks, compromised gateways, AI-driven malware, distributed DDoS attacks, and network-based eavesdropping. This review article analyzes current literature on IoT security and examines emerging approaches including blockchain, machine learning, Zero-Trust architectures, lightweight cryptography, distributed authentication, and quantum-resistant models. A comprehensive comparison with previous studies is provided through a detailed table, followed by a discussion of the innovations of the present work. Finally, a thorough roadmap for enhancing cybersecurity in smart urban and home infrastructures through 2035 is presented. Keywords:Cybersecurity; Internet of Things; Smart City; Smart Home; Blockchain; Machine Learning

Keywords

Main Subjects


Abbasi, M., Cardoso, F., Váz, P., Silva, J., & Martins, P. (2025). A practical performance benchmark of post‑quantum cryptography across heterogeneous computing environments. Cryptography, 9(2), 32. https://doi.org/10.3390/cryptography9020032
Ahmed, N., Zhang, L., & Gangopadhyay, A. (2025). A survey of post‑quantum cryptography support in cryptographic libraries. arXiv. https://doi.org/10.48550/arXiv.2508.16078
Alharbi, S., Attiah, A., & Alghazzawi, D. (2022). Integrating blockchain with artificial intelligence to secure IoT networks: Future trends. Sustainability, 14(23), 16002.‏ https://doi.org/10.3390/su142316002
Almeida, F. (2023). Prospects of cybersecurity in smart cities. Future Internet, 15(9), 285. https://doi.org/10.3390/fi15090285
Almutairi, M., & Sheldon, F. T. (2025). Resilience of post‑quantum cryptography in lightweight IoT protocols: A systematic review. Eng, 6(12), 346. https://doi.org/10.3390/eng6120346
Antonakakis, M., April, T., Bailey, M., Bernhard, M., Bursztein, E., Cochran, J., ... & Zhao, Y. (2017). Understanding the Mirai botnet. USENIX Security Symposium (pp. 1092–1110). https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/antonakakis
Asghari, P., Rahmani, A. M., & Javadi, H. (2022). Internet of Things applications: A systematic review. Computer Networks, 197, 108200. https://doi.org/10.1016/j.comnet.2021.108200
Asif, R. (2021). Post‑quantum cryptosystems for Internet‑of‑Things: A survey on lattice‑based algorithms. IoT, 2(1), 71–91. https://doi.org/10.3390/iot2010005
Barros, P., & Lopes, S. I. (2026). Roadmapping cybersecurity for IoT-enabled smart environments. Lecture Notes in Networks and Systems (pp. 332–347). 1753 LNNS. https://doi.org/10.1007/978‑3‑032‑12888‑1_29
Chang, D. (2025). Resilient cryptographic frameworks for post‑quantum security in resource‑constrained Internet of Things architectures. International Journal of IoT and Blockchain (ISCSITR).https://iscsitr.in/index.php/ISCSITR-IJIOTBC/article/view/ISCSITR-IJIOTBC_03_01_001 (iscsitr.in)
Chen, L., Jordan, S., Liu, Y.-K., Moody, D., Peralta, R., Perlner, R., ... & Smith-Tone, D. (2022). Report on post-quantum cryptography. National Institute of Standards and Technology.https://doi.org/10.6028/NIST.IR.8105
Chhetri, G., Somvanshi, S., Hebli, P., Brotee, S., & Das, S. (2025). Post‑quantum cryptography and quantum‑safe security: A comprehensive survey. arXiv. https://doi.org/10.48550/arXiv.2510.10436
Cruz‑Piris, L., Marín‑López, A., Álvarez‑Campana, M., Sanz, M., Moreno, J. I., & Arroyo, D. (2025). Measuring the impact of post‑quantum cryptography in Industrial IoT scenarios. Internet of Things, Article 101793. https://doi.org/10.1016/j.iot.2025.101793
Dorri, A., Kanhere, S. S., & Jurdak, R. (2017). Blockchain for IoT security and privacy: The case study of a smart home. In 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (pp. 618–623). https://doi.org/10.1109/PERCOMW.2017.7917634
Dritsas, E., & Trigka, M. (2025). A survey on cybersecurity in IoT. Future Internet, 17(1), 30. https://doi.org/10.3390/fi17010030
Ehsan, M. A., Alayed, W., Rehman, A. U., Hassan, W. U., & Zeeshan, A. (2025). Post‑Quantum KEMs for IoT: A study of kyber and NTRU. Symmetry, 17(6), 881. https://doi.org/10.3390/sym17060881
Hameed, H. A., Swadi Alhamedi, H. J., Abbas, W. F., Alsayednoor, H. M., Al‑Shareeda, M. A., Almaayah, M., & Shehab, R. (2025). PQ‑Lattice: A lattice‑based post‑quantum authentication protocol for decentralized IoT systems. Informatica, 49(35), 259–272. https://doi.org/10.31449/inf.v49i35.12156
Khan, I. U., Khan, F. M., Haider, Z. A., & Alturise, F. (2025). Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A comprehensive review of advanced cybersecurity framework. Interactions8, 9.‏ https://doi.org/10.32604/cmc.2025.070189
Kumari, S., Singh, M., Singh, R., & Tewari, H. (2022). To secure the communication in powerful Internet of Things using innovative post‑quantum cryptographic method. Arabian Journal for Science and Engineering, 47(2), 2419‑2434. https://doi.org/10.1007/s13369-021-06166-6
Lin, J., & Bergmann, N. W. (2021). IoT security challenges and solutions. Journal of Cybersecurity, 7(2),45–62. https://doi.org/10.1093/cybsec/tyab009
Mahdi, L. H., & Abdullah, A. A. (2025). Fortifying future IoT security: A comprehensive review on lightweight post‑quantum cryptography. Engineering, Technology & Applied Science Research, 15(2), 21812–21821. https://doi.org/10.48084/etasr.10141
National Institute of Standards and Technology (NIST). (2022). Lightweight cryptography standardization process. https://csrc.nist.gov/projects/lightweight-cryptography
Pote, P., & Bansode, R. (2025). Performance evaluation of post‑quantum cryptography: A comprehensive framework for experimental analysis. Journal of Information Systems Engineering and Management, 10(9s).
Rassekhnia, J. (2026a). QERS: Quantum encryption resilience score for post‑quantum cryptography in computer, IoT, and IIoT systems. arXiv. https://doi.org/10.48550/arXiv.2601.13399
Rassekhnia, J. (2026b). Quantum Encryption Resilience Score (QERS) for MQTT, HTTP, and HTTPS under post‑quantum cryptography in computer, IoT, and IIoT systems. arXiv. https://arxiv.org/abs/2601.13423
Rose, S., Borchert, O., Mitchell, S., & Connelly, S. (2020). Zero Trust Architecture (NIST Special Publication 800-207). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-207
Rubia, J. J., Lincy, R. B., Nithila, E. E., Shibi, C. S., & Rosi, A. (2024). A survey about post quantum cryptography methods. EAI Endorsed Transactions on Internet of Things, 10, 1‑9. https://doi.org/10.4108/eetiot.5099
Seedorf, J., Rawal, D., Möwes, J., Abdulaziz, O. H., Alhasan, A., & Santhanavanich, T. (2025). A prototype for evaluating post‑quantum cryptography on resource‑constrained hardware with real‑world smart city sensor data. Int. Arch. Photogramm. Remote Sens. Spatial Inf. Sci., XLVIII‑4/W16‑2025, 113–120. https://doi.org/10.5194/isprs-archives-XLVIII-4-W16-2025-113-2025 (isprs-archives.copernicus.org)
Senor, J., Portilla, J., & Mujica, G. (2022). Analysis of the NTRU post‑quantum cryptographic scheme in constrained IoT edge devices. IEEE Internet of Things Journal, 9(19), 18778‑18790. https://doi.org/10.1109/JIOT.2022.3162254
Seyhan, K., Nguyen, T. N., Akleylek, S., & Cengiz, K. (2022). Lattice‑based cryptosystems for the security of resource‑constrained IoT devices in post‑quantum world: A survey. Cluster Computing, 25(3), 1729‑1748. https://doi.org/10.1007/s10586-021-03380-7
Sharma, D., Kumar, R., & Jung, K. H. (2023). A bibliometric analysis of convergence of artificial intelligence and blockchain for edge of things. Journal of Grid Computing, 21(4), 79. https://doi.org/10.1007/s10723-023-09716-4 ‏
Sicari, S., Rizzardi, A., & Coen-Porisini, A. (2020). Security, privacy, and trust in the Internet of Things: The road ahead. Computer Communications, 159, 120–137.https://doi.org/10.1016/j.comcom.2020.05.046
Siddharth. (2025). Post‑Quantum cryptographic algorithm performance on IoT devices. International Journal of Advanced Research in Computer Science and Engineering(IJARCSE), 1(2). https://doi.org/10.63345/ijarcse.v1.i2.304
Singh, T., & Nisha, T. N. (2025, July). Enhancing IoT Security with Zero-Trust Architecture: A model leveraging blockchain and AI capabilities. In 2025 International Conference on Emerging Information Technology and Engineering Solutions (EITES) (pp. 173-179). https://doi.org/10.1109/EITES66543.2025.00038
Statista. (2023). Number of Internet of Things (IoT) connected devices worldwide from 2019 to 2030. https://www.statista.com
Usama, M., Aziz, A., Alasbali, N., Alturki, N., & Rehman, M. (2026). Blockchain-enabled identity management for IoT: A multi-layered defense against adversarial AI. Scientific Reports, 16, 4371. https://doi.org/10.1038/s41598‑026‑35208‑y
Wikipedia (n.d.). Lattice‑based cryptography. https://en.wikipedia.org/wiki/Lattice‑based_cryptography
Ye, Z., Song, R., Zhang, H., Chen, D., Cheung, R. C.‑C., & Huang, K. (2024). A highly‑efficient lattice‑based post‑quantum cryptography processor for IoT applications. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2024(2), 130‑153. https://doi.org/10.46586/tches.v2024.i2.130-153
Zakaria, A. A., Amr, T., & Ragheb, A. A. (2025). IoT in smart urban planning: A comprehensive review of applications, developments and engineering perspectives. IEEE Access. https://doi.org/10.1109/ACCESS.2025.3594019
Zhang, Y., Wang, X., & Chen, J. (2021). Machine learning-based intrusion detection for IoT networks. IEEE Internet of Things Journal, 8(14), 11413–11425. https://doi.org/10.1109/JIOT.2021.3065432