Privacy-preserving security of IoT networks: A comparative analysis of methods and applications

The Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including resource constraints, scalability issues, interoperability gaps, and risks to data privacy. Addressin...

Full description

Saved in:
Bibliographic Details
Main Authors: Abubakar Wakili, Sara Bakkali
Format: Article
Language:English
Published: KeAi Communications Co., Ltd. 2025-12-01
Series:Cyber Security and Applications
Subjects:
Online Access:http://www.sciencedirect.com/science/article/pii/S2772918425000013
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841545527698653184
author Abubakar Wakili
Sara Bakkali
author_facet Abubakar Wakili
Sara Bakkali
author_sort Abubakar Wakili
collection DOAJ
description The Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including resource constraints, scalability issues, interoperability gaps, and risks to data privacy. Addressing these challenges is vital to ensure the reliability and trustworthiness of IoT applications. This study provides a comprehensive analysis of privacy-preserving security methods, evaluating cryptography, blockchain, machine learning, and fog/edge computing against performance indicators such as scalability, efficiency, robustness, and usability. Through a structured literature review and thorough data analysis, the study reveals that while cryptography offers high security, it faces scalability challenges; blockchain excels in decentralization but struggles with efficiency; machine learning provides adaptive intelligence but raises privacy concerns; and fog/edge computing delivers low-latency processing yet encounters operational complexities. The findings highlight the importance of adopting a hybrid approach that combines the strengths of various methods to overcome their limitations. This study serves as a valuable resource for academia, industry professionals, and policymakers, providing guidance to strengthen IoT infrastructures and influence the direction of future research.
format Article
id doaj-art-aa0ec78d4eba44109e51eb57b648f6e0
institution Kabale University
issn 2772-9184
language English
publishDate 2025-12-01
publisher KeAi Communications Co., Ltd.
record_format Article
series Cyber Security and Applications
spelling doaj-art-aa0ec78d4eba44109e51eb57b648f6e02025-01-12T05:26:20ZengKeAi Communications Co., Ltd.Cyber Security and Applications2772-91842025-12-013100084Privacy-preserving security of IoT networks: A comparative analysis of methods and applicationsAbubakar Wakili0Sara Bakkali1Corresponding author.; Euromed University of Fez, MoroccoEuromed University of Fez, MoroccoThe Internet of Things (IoT) connects devices to enhance efficiency, productivity, and quality of life. However, deploying IoT networks introduces critical privacy and security challenges, including resource constraints, scalability issues, interoperability gaps, and risks to data privacy. Addressing these challenges is vital to ensure the reliability and trustworthiness of IoT applications. This study provides a comprehensive analysis of privacy-preserving security methods, evaluating cryptography, blockchain, machine learning, and fog/edge computing against performance indicators such as scalability, efficiency, robustness, and usability. Through a structured literature review and thorough data analysis, the study reveals that while cryptography offers high security, it faces scalability challenges; blockchain excels in decentralization but struggles with efficiency; machine learning provides adaptive intelligence but raises privacy concerns; and fog/edge computing delivers low-latency processing yet encounters operational complexities. The findings highlight the importance of adopting a hybrid approach that combines the strengths of various methods to overcome their limitations. This study serves as a valuable resource for academia, industry professionals, and policymakers, providing guidance to strengthen IoT infrastructures and influence the direction of future research.http://www.sciencedirect.com/science/article/pii/S2772918425000013Privacy-preserving securityInternet of Things (IoT) networksCryptographyBlockchainMachine learningFog/edge computing
spellingShingle Abubakar Wakili
Sara Bakkali
Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
Cyber Security and Applications
Privacy-preserving security
Internet of Things (IoT) networks
Cryptography
Blockchain
Machine learning
Fog/edge computing
title Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
title_full Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
title_fullStr Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
title_full_unstemmed Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
title_short Privacy-preserving security of IoT networks: A comparative analysis of methods and applications
title_sort privacy preserving security of iot networks a comparative analysis of methods and applications
topic Privacy-preserving security
Internet of Things (IoT) networks
Cryptography
Blockchain
Machine learning
Fog/edge computing
url http://www.sciencedirect.com/science/article/pii/S2772918425000013
work_keys_str_mv AT abubakarwakili privacypreservingsecurityofiotnetworksacomparativeanalysisofmethodsandapplications
AT sarabakkali privacypreservingsecurityofiotnetworksacomparativeanalysisofmethodsandapplications