{"title":"Privacy-preserving security of IoT networks: A comparative analysis of methods and applications","authors":"Abubakar Wakili, Sara Bakkali","doi":"10.1016/j.csa.2025.100084","DOIUrl":null,"url":null,"abstract":"<div><div>The Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including resource constraints, scalability issues, interoperability gaps, and risks to data privacy. Addressing these challenges is vital to ensure the reliability and trustworthiness of IoT applications. This study provides a comprehensive analysis of privacy-preserving security methods, evaluating cryptography, blockchain, machine learning, and fog/edge computing against performance indicators such as scalability, efficiency, robustness, and usability. Through a structured literature review and thorough data analysis, the study reveals that while cryptography offers high security, it faces scalability challenges; blockchain excels in decentralization but struggles with efficiency; machine learning provides adaptive intelligence but raises privacy concerns; and fog/edge computing delivers low-latency processing yet encounters operational complexities. The findings highlight the importance of adopting a hybrid approach that combines the strengths of various methods to overcome their limitations. This study serves as a valuable resource for academia, industry professionals, and policymakers, providing guidance to strengthen IoT infrastructures and influence the direction of future research.</div></div>","PeriodicalId":100351,"journal":{"name":"Cyber Security and Applications","volume":"3 ","pages":"Article 100084"},"PeriodicalIF":0.0000,"publicationDate":"2025-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Cyber Security and Applications","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2772918425000013","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including resource constraints, scalability issues, interoperability gaps, and risks to data privacy. Addressing these challenges is vital to ensure the reliability and trustworthiness of IoT applications. This study provides a comprehensive analysis of privacy-preserving security methods, evaluating cryptography, blockchain, machine learning, and fog/edge computing against performance indicators such as scalability, efficiency, robustness, and usability. Through a structured literature review and thorough data analysis, the study reveals that while cryptography offers high security, it faces scalability challenges; blockchain excels in decentralization but struggles with efficiency; machine learning provides adaptive intelligence but raises privacy concerns; and fog/edge computing delivers low-latency processing yet encounters operational complexities. The findings highlight the importance of adopting a hybrid approach that combines the strengths of various methods to overcome their limitations. This study serves as a valuable resource for academia, industry professionals, and policymakers, providing guidance to strengthen IoT infrastructures and influence the direction of future research.