Skip to main content

Advertisement

Log in

Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

Abstract

The Internet of Things (IoT) is an important virtual network that allows remote users to access linked multimedia devices. The development of IoT and its ubiquitous application across various domains of everyday life has led to continuous research efforts. Security is a perceptual concern for researchers involved in IoT as it is a key factor in the acceptance of any innovative technology. Numerous research studies have been conducted concentrating on the level of IoT security on a particular mechanism, on specific applications, or on categorizing vulnerabilities, in order to address a defined situation of securing an IoT network. This present paper aims to comprehensively review potential solutions for securing IoT, between emerging and traditional mechanisms, such as blockchain, machine learning, cryptography, and quantum computing. This study provides a comparative analysis of related papers with their characteristics, pros and cons. Accordingly, it taxonomizes relevant solutions based on their achieved security requirements. Furthermore, the potential benefits and challenges of each of the four mechanisms are discussed.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

Availability of data and materials

No datasets were used in this review article.

References

  1. Ray PP (2018) A survey on internet of things architectures. J King Saud Univ-Comput Inf Sci 30(3):291–319

    Google Scholar 

  2. HaddadPajouh H, Dehghantanha A, Parizi RM, Aledhari M, Karimipour H (2021) A survey on internet of things security: requirements, challenges, and solutions. Internet of Things 14:100129

    Google Scholar 

  3. Bandyopadhyay D, Sen J (2011) Internet of things: applications and challenges in technology and standardization. Wireless Pers Commun 58:49–69

    Google Scholar 

  4. Omolara AE, Alabdulatif A, Abiodun OI, Alawida M, Alabdulatif A, Arshad H et al (2022) The internet of things security: a survey encompassing unexplored areas and new insights. Comput & Secur 112:102494

    Google Scholar 

  5. Kumari S, Singh M, Singh R, Tewari H (2022) Post-quantum cryptography techniques for secure communication in resource-constrained internet of things devices: A comprehensive survey. Softw: Pract and Exper 52(10):2047–2076

    Google Scholar 

  6. Shah Z, Ullah I, Li H, Levula A, Khurshid K (2022) Blockchain based solutions to mitigate distributed denial of service (ddos) attacks in the internet of things (iot): a survey. Sensors 22(3):1094

    Google Scholar 

  7. Kumar A, Saha R, Conti M, Kumar G, Buchanan WJ, Kim TH (2022) A comprehensive survey of authentication methods in internet-of-things and its conjunctions. J Netw and Compt Appl 204:103414

    Google Scholar 

  8. Thabit F, Can O, Aljahdali AO, Al-Gaphari GH, Alkhzaimi HA (2023) A comprehensive literature survey of cryptography algorithms for improving the iot security, Internet of Things, 100759

  9. Mathur S, Kalla A, Gür G, Bohra MK, Liyanage M (2023) A survey on role of blockchain for iot: applications and technical aspects. Comput Netw 227:109726

    Google Scholar 

  10. Gaurav A, Gupta BB, Panigrahi PK (2022) A comprehensive survey on machine learning approaches for malware detection in iot-based enterprise information system. Enterprise Inf Syst 17(3):2023764

    Google Scholar 

  11. Papaioannou M, Karageorgou M, Mantas G, Sucasas V, Essop I, Rodriguez J, Lymberopoulos D (2022) A survey on security threats and countermeasures in internet of medical things (iomt). Trans on Emerg Telecommun Technol 33(6):e4049

    Google Scholar 

  12. Razzaq MA, Gill SH, Qureshi MA, Ullah S Security issues in the internet of things (iot): A comprehensive study, Int J Adv Comput Sci and Appl 8(6)

  13. Alfandi O, Khanji S, Ahmad L, Khattak A (2021) A survey on boosting iot security and privacy through blockchain: exploration, requirements, and open issues. Clust Comput 24:37–55

    Google Scholar 

  14. Khan MA, Salah K (2018) Iot security: review, blockchain solutions, and open challenges. Futur Gener Comput Syst 82:395–411

    Google Scholar 

  15. Dhillon PK, Kalra S (2017) Secure multi-factor remote user authentication scheme for internet of things environments. Int J Commun Syst 30(16):e3323

    Google Scholar 

  16. La Torre M, Dumay J, Rea MA (2018) Breaching intellectual capital: critical reflections on big data security. Meditari Accountancy Res 26(3):463–482

    Google Scholar 

  17. Kumar A, Jain V, Yadav A (2020) A new approach for security in cloud data storage for iot applications using hybrid cryptography technique, In: 2020 international conference on power electronics & IoT applications in renewable energy and its control (PARC). IEEE, pp 514–517

  18. Yang P, Xiong N, Ren J (2020) Data security and privacy protection for cloud storage: a survey. IEEE Access 8:131723–131740

    Google Scholar 

  19. Steichen M, Fiz B, Norvill R, Shbair W, State R (2018) Blockchain-based, decentralized access control for ipfs, In: 2018 Ieee international conference on internet of things (iThings) and ieee green computing and communications (GreenCom) and ieee cyber, physical and social computing (CPSCom) and ieee smart data (SmartData). IEEE, pp 1499–1506

  20. Raja Santhi A, Muthuswamy P (2022) Influence of blockchain technology in manufacturing supply chain and logistics. Logistics 6(1):15

    Google Scholar 

  21. Benzaïd C, Taleb T, Farooqi MZ (2021) Trust in 5g and beyond networks. IEEE Netw 35(3):212–222

    Google Scholar 

  22. Mall P, Amin R, Das AK, Leung MT, Choo K-KR (2022) Puf-based authentication and key agreement protocols for iot, wsns, and smart grids: a comprehensive survey. IEEE Internet Things J 9(11):8205–8228

    Google Scholar 

  23. Cherbal S, Benchetioui R (2023) Scpuak: smart card-based secure protocol for remote user authentication and key agreement. Comput Electr Eng 109:108759

    Google Scholar 

  24. Khraisat A, Alazab A (2021) A critical review of intrusion detection systems in the internet of things: techniques, deployment strategy, validation strategy, attacks, public datasets and challenges. Cybersecurity 4:1–27

    Google Scholar 

  25. Rana M, Mamun Q, Islam R (2022) Lightweight cryptography in iot networks: a survey. Futur Gener Comput Syst 129:77–89

    Google Scholar 

  26. Ahanger TA, Aljumah A, Atiquzzaman M (2022) State-of-the-art survey of artificial intelligent techniques for iot security. Comput Netw 206:108771

    Google Scholar 

  27. Wu H, Han H, Wang X, Sun S (2020) Research on artificial intelligence enhancing internet of things security: a survey. Ieee Access 8:153826–153848

    Google Scholar 

  28. Fernández-Caramés TM (2019) From pre-quantum to post-quantum iot security: A survey on quantum-resistant cryptosystems for the internet of things. IEEE Internet Things J 7(7):6457–6480

    Google Scholar 

  29. Sadhu PK, Yanambaka VP, Abdelgawad A (2022) Internet of things: security and solutions survey. Sensors 22(19):7433

    Google Scholar 

  30. Mothukuri V, Khare P, Parizi RM, Pouriyeh S, Dehghantanha A, Srivastava G (2021) Federated-learning-based anomaly detection for iot security attacks. IEEE Internet Things J 9(4):2545–2554

    Google Scholar 

  31. Uprety A, Rawat DB (2020) Reinforcement learning for iot security: a comprehensive survey. IEEE Internet Things J 8(11):8693–8706

    Google Scholar 

  32. Mohanta BK, Satapathy U, Panda SS, Jena D (2019) A novel approach to solve security and privacy issues for iot applications using blockchain, In: 2019 International Conference on Information Technology (ICIT), IEEE, pp 394–399

  33. Deogirikar J, Vidhate A (2017) Security attacks in iot: A survey, In: 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud)(I-SMAC), IEEE, pp 32–37

  34. Yong B, Wei W, Li K-C, Shen J, Zhou Q, Wozniak M, Połap D, Damaševičius R (2022) Ensemble machine learning approaches for webshell detection in internet of things environments. Trans Emerg Telecommun Technol 33(6):e4085

    Google Scholar 

  35. Gamage H, Weerasinghe H, Dias N (2020) A survey on blockchain technology concepts, applications, and issues. SN Comput Sci 1:1–15

    Google Scholar 

  36. Zheng Z, Xie S, Dai H, Chen X, Wang H (2017) An overview of blockchain technology: Architecture, consensus, and future trends, In: 2017 IEEE international congress on big data (BigData congress). IEEE, pp 557–564

  37. Alkhateeb A, Catal C, Kar G, Mishra A (2022) Hybrid blockchain platforms for the internet of things (iot): a systematic literature review. Sensors 22(4):1304

    Google Scholar 

  38. Huo R, Zeng S, Wang Z, Shang J, Chen W, Huang T, Wang S, Yu FR, Liu Y (2022) A comprehensive survey on blockchain in industrial internet of things: Motivations, research progresses, and future challenges. IEEE Commun Surveys & Tutorials 24(1):88–122

    Google Scholar 

  39. Kumar S, Raut RD, Agrawal N, Cheikhrouhou N, Sharma M, Daim T (2022) Integrated blockchain and internet of things in the food supply chain: adoption barriers. Technovation 118:102589

    Google Scholar 

  40. Wu Y, Wu Y, Cimen H, Vasquez JC, Guerrero JM (2022) P2p energy trading: blockchain-enabled p2p energy society with multi-scale flexibility services. Energy Rep 8:3614–3628

    Google Scholar 

  41. Sarker IH (2022) Ai-based modeling: techniques, applications and research issues towards automation, intelligent and smart systems. SN Comput Sci 3(2):158

    Google Scholar 

  42. Dalal KR (2020) Analysing the role of supervised and unsupervised machine learning in iot, In: 2020 International Conference on Electronics and Sustainable Communication Systems (ICESC). IEEE, pp 75–79

  43. Xiao L, Wan X, Lu X, Zhang Y, Wu D (2018) Iot security techniques based on machine learning: how do iot devices use ai to enhance security? IEEE Signal Process Mag 35(5):41–49

    Google Scholar 

  44. Nikam SS (2015) A comparative study of classification techniques in data mining algorithms. Oriental J Comput Sci and Technol 8(1):13–19

    Google Scholar 

  45. Mousavi SK, Ghaffari A, Besharat S, Afshari H (2021) Security of internet of things based on cryptographic algorithms: a survey. Wireless Netw 27:1515–1555

    Google Scholar 

  46. Jose DV, Vijyalakshmi A (2018) An overview of security in internet of things. Procedia Comput Sci 143:744–748

    Google Scholar 

  47. Almazrooie M, Samsudin A, Gutub AA-A, Salleh MS, Omar MA, Hassan SA (2020) Integrity verification for digital holy quran verses using cryptographic hash function and compression. J King Saud Univ-Comput and Inf Sci 32(1):24–34

    Google Scholar 

  48. Bernhardt C (2019) Quantum computing for everyone. Mit Press

    Google Scholar 

  49. Gill SS, Kumar A, Singh H, Singh M, Kaur K, Usman M, Buyya R (2022) Quantum computing: a taxonomy, systematic review and future directions. Software: Practice and Exper 52(1):66–114

    Google Scholar 

  50. Cusumano MA (2018) The business of quantum computing. Commun ACM 61(10):20–22

    Google Scholar 

  51. Bhatt AP, Sharma A (2019) Quantum cryptography for internet of things security. J Electr Sci and Technol 17(3):213–220

    Google Scholar 

  52. Broadbent A, Schaffner C (2016) Quantum cryptography beyond quantum key distribution. Des Codes Crypt 78:351–382

    MathSciNet  Google Scholar 

  53. Williams P, Dutta IK, Daoud H, Bayoumi M (2022) A survey on security in internet of things with a focus on the impact of emerging technologies. Internet of Things 19:100564

    Google Scholar 

  54. Corallo A, Lazoi M, Lezzi M, Luperto A (2022) Cybersecurity awareness in the context of the industrial internet of things: a systematic literature review. Comput Ind 137:103614

    Google Scholar 

  55. Shirvani MH, Masdari M (2022) A survey study on trust-based security in internet of things: Challenges and issues, Internet of Things, 100640

  56. Swessi D, Idoudi H (2022) A survey on internet-of-things security: threats and emerging countermeasures. Wireless Pers Commun 124(2):1557–1592

    Google Scholar 

  57. Alzoubi YI, Al-Ahmad A, Kahtan H, Jaradat A (2022) Internet of things and blockchain integration: security, privacy, technical, and design challenges. Future Internet 14(7):216

    Google Scholar 

  58. Khan AA, Laghari AA, Shaikh ZA, Dacko-Pikiewicz Z, Kot S Internet of things (iot) security with blockchain technology: a state-of-the-art review, IEEE Access

  59. Savithri G, Mohanta BK, Dehury MK (2022) A brief overview on security challenges and protocols in internet of things application, In: 2022 IEEE International IOT, Electronics and Mechatronics Conference (IEMTRONICS). IEEE, pp 1–7

  60. Khan AR, Kashif M, Jhaveri RH, Raut R, Saba T, Bahaj SA (2022) Deep learning for intrusion detection and security of internet of things (iot): current analysis, challenges, and possible solutions, Security and Communication Networks

  61. Sarker IH, Khan AI, Abushark YB, Alsolami F (2022) Internet of things (iot) security intelligence: a comprehensive overview, machine learning solutions and research directions, Mobile Networks and Applications, 1–17

  62. Raimundo RJ, Rosário AT (2022) Cybersecurity in the internet of things in industrial management. Appl Sci 12(3):1598

    Google Scholar 

  63. Khan NA, Awang A, S. A. Karim BA Security in internet of things: A review, IEEE Access

  64. Heidari A, Jabraeil Jamali MA (2022) Internet of things intrusion detection systems: A comprehensive review and future directions, Cluster Computing, 1–28

  65. Issa W, Moustafa N, Turnbull B, Sohrabi N, Tari Z (2023) Blockchain-based federated learning for securing internet of things: a comprehensive survey. ACM Comput Surv 55(9):1–43

    Google Scholar 

  66. Kumar A, Bhushan B, Shriti S, Nand P (2022) Quantum computing for health care: a review on implementation trends and recent advances, Multimedia Technologies in the Internet of Things. Environment 3:23–40

    Google Scholar 

  67. Jahangeer A, Bazai SU, Aslam S, Marjan S, Anas M, Hashemi SH A review on the security of iot networks: From network layer’s perspective, IEEE Access

  68. Taherdoost H (2023) Security and internet of things: benefits, challenges, and future perspectives. Electronics 12(8):1901

    Google Scholar 

  69. de Azambuja AJG, Plesker C, Schützer K, Anderl R, Schleich B, Almeida VR (2023) Artificial intelligence-based cyber security in the context of industry 4.0-a survey. Electronics 12(8):1920

    Google Scholar 

  70. Mangla C, Rani S, Qureshi NMF, Singh A (2023) Mitigating 5g security challenges for next-gen industry using quantum computing. J of King Saud Univ-Comput and Inf Sci 35(6):101334

    Google Scholar 

  71. Latif S, Idrees Z, Ahmad J, Zheng L, Zou Z (2021) A blockchain-based architecture for secure and trustworthy operations in the industrial internet of things. J Indus Inf Int 21:100190. https://doi.org/10.1016/j.jii.2020.100190

    Article  Google Scholar 

  72. Wadhwa S, Rani S, Kaur G, Koundal D, Zaguia A, Enbeyle W (2022) Heterofl blockchain approach-based security for cognitive internet of things, Wireless Communications and Mobile Computing

  73. Wang J, Chen J, Ren Y, Sharma PK, Alfarraj O, Tolba A (2022) Data security storage mechanism based on blockchain industrial internet of things. Comput & Industrial Eng 164:107903

    Google Scholar 

  74. Agyekum KO-BO, Xia Q, Sifah EB, Cobblah CNA, Xia H, Gao J (2021) A proxy re-encryption approach to secure data sharing in the internet of things based on blockchain. IEEE Syst J 16(1):1685–1696

    Google Scholar 

  75. De Caro A, Iovino V (2011) jpbc: Java pairing based cryptography, In: 2011 IEEE Symposium on Computers and Communications (ISCC). IEEE, pp 850–855

  76. Chai B, Yan B, Yu J, Wang G (2021) Bhe-ac: a blockchain-based high-efficiency access control framework for internet of things, Personal and Ubiquitous Computing, 1–12

  77. Rizzardi A, Sicari S, Miorandi D, Coen-Porisini A (2022) Securing the access control policies to the internet of things resources through permissioned blockchain. Concurrency and Comput: Pract and Exp 34(15):e6934

    Google Scholar 

  78. Ngabo D, Wang D, Iwendi C, Anajemba JH, Ajao LA, Biamba C (2021) Blockchain-based security mechanism for the medical data at fog computing architecture of internet of things. Electronics 10(17):2110

    Google Scholar 

  79. Chaganti R, Varadarajan V, Gorantla VS, Gadekallu TR, Ravi V (2022) Blockchain-based cloud-enabled security monitoring using internet of things in smart agriculture. Future Internet 14(9):250

    Google Scholar 

  80. Honar Pajooh H, Rashid M, Alam F, Demidenko S (2021) Multi-layer blockchain-based security architecture for internet of things. Sensors 21(3):772

    Google Scholar 

  81. Dhar S, Khare A, Singh R (2022) Advanced security model for multimedia data sharing in internet of things, Trans Emerg Telecommun Technol, e4621

  82. Ipfs: a decentralised cloud and file system for the blockchain environment (2020) https://www.opensourceforu.com/2020/08/ipfs-a-decentralised-cloud-and-file-system-for-the-blockchain-environment

  83. Chentouf FZ, Bouchkaren S (2023) Security and privacy in smart city: a secure e-voting system based on blockchain. Intl J of Electr and Comput Eng 13(2):1848

    Google Scholar 

  84. Khan AA, Bourouis S, Kamruzzaman M, Hadjouni M, Shaikh ZA, Laghari AA, Elmannai H, Dhahbi S Data security in healthcare industrial internet of things with blockchain, IEEE Sensors Journal

  85. Mihoub A, Fredj OB, Cheikhrouhou O, Derhab A, Krichen M (2022) Denial of service attack detection and mitigation for internet of things using looking-back-enabled machine learning techniques. Comput & Electrical Eng 98:107716

    Google Scholar 

  86. Yazdinejad A, Kazemi M, Parizi RM, Dehghantanha A, Karimipour H (2023) An ensemble deep learning model for cyber threat hunting in industrial internet of things. Digital Commun and Netw 9(1):101–110

    Google Scholar 

  87. Alkahtani H, Aldhyani TH (2021) Intrusion detection system to advance internet of things infrastructure-based deep learning algorithms. Complexity 2021:1–18

    Google Scholar 

  88. Tharewal S, Ashfaque MW, Banu SS, Uma P, Hassen SM, Shabaz M (2022) Intrusion detection system for industrial internet of things based on deep reinforcement learning. Wirel Commun Mob Comput 2022:1–8

    Google Scholar 

  89. Mazhar MS, Saleem Y, Almogren A, Arshad J, Jaffery MH, Rehman AU, Shafiq M, Hamam H (2022) Forensic analysis on internet of things (iot) device using machine-to-machine (m2m) framework. Electronics 11(7):1126

    Google Scholar 

  90. Javeed D, Gao T, Khan MT, Ahmad I (2021) A hybrid deep learning-driven sdn enabled mechanism for secure communication in internet of things (iot). Sensors 21(14):4884

    Google Scholar 

  91. Liu X, Yu W, Liang F, Griffith D, Golmie N (2021) On deep reinforcement learning security for industrial internet of things. Comput Commun 168:20–32

    Google Scholar 

  92. Saba T, Sadad T, Rehman A, Mehmood Z, Javaid Q (2021) Intrusion detection system through advance machine learning for the internet of things networks. IT Professional 23(2):58–64

    Google Scholar 

  93. Sahu AK, Sharma S, Tanveer M, Raja R (2021) Internet of things attack detection using hybrid deep learning model. Comput Commun 176:146–154

    Google Scholar 

  94. Hasan T, Malik J, Bibi I, Khan WU, Al-Wesabi FN, Dev K, Huang G Securing industrial internet of things against botnet attacks using hybrid deep learning approach, IEEE Trans on Netw Sci and Eng

  95. Jothi B, Pushpalatha M (2023) Wils-trs-a novel optimized deep learning based intrusion detection framework for iot networks. Pers Ubiquit Comput 27(3):1285–1301

    Google Scholar 

  96. Musleh D, Alotaibi M, Alhaidari F, Rahman A, Mohammad RM (2023) Intrusion detection system using feature extraction with machine learning algorithms in iot. J Sens Actuator Netw 12(2):29

    Google Scholar 

  97. Xu H, Sun Z, Cao Y, Bilal H (2023) A data-driven approach for intrusion and anomaly detection using automated machine learning for the internet of things, Soft Computing, 1–13

  98. Khalifa M, Algarni F, Khan MA, Ullah A, Aloufi K (2021) A lightweight cryptography (lwc) framework to secure memory heap in internet of things. Alex Eng J 60(1):1489–1497

    Google Scholar 

  99. Liu X, Wang X, Yu K, Yang X, Ma W, Li G, Zhao X (2022) Secure data aggregation aided by privacy preserving in internet of things, Wireless Communications and Mobile Computing

  100. Ullah I, Alkhalifah A, Althobaiti MM, Al-Wesabi FN, Hilal AM, Khan MA, Ming-Tai Wu J (2022) Certificate-based signature scheme for industrial internet of things using hyperelliptic curve cryptography, Wireless Communications and Mobile Computing

  101. Khan J, Khan GA, Li JP, AlAjmi MF, Haq AU, Khan S, Ahmad N, Parveen S, Shahid M, Ahmad S et al (2022) Secure smart healthcare monitoring in industrial internet of things (iiot) ecosystem with cosine function hybrid chaotic map encryption, Scientific Programming

  102. Jerbi W, Guermazi A, Cheikhrouhou O, Trabelsi H (2021) Coopecc: a collaborative cryptographic mechanism for the internet of things. J of Sens 2021:1–8

    Google Scholar 

  103. Chanal PM, Kakkasageri MS (2021) Preserving data confidentiality in internet of things. SN Comput Sci 2(1):53

    Google Scholar 

  104. Unal D, Al-Ali A, Catak FO, Hammoudeh M (2021) A secure and efficient internet of things cloud encryption scheme with forensics investigation compatibility based on identity-based encryption. Futur Gener Comput Syst 125:433–445

    Google Scholar 

  105. Liu X, Yang X, Luo Y, Zhang Q (2021) Verifiable multikeyword search encryption scheme with anonymous key generation for medical internet of things. IEEE Internet Things J 9(22):22315–22326

    Google Scholar 

  106. Sahmi I, Abdellaoui A, Mazri T, Hmina N Mqtt-present: Approach to secure internet of things applications using mqtt protocol., Int J of Electr & Comput Eng (2088-8708) 11 (5)

  107. Gong B, Wu Y, Wang Q, Ren Y-H, Guo C (2022) A secure and lightweight certificateless hybrid signcryption scheme for internet of things. Futur Gener Comput Syst 127:23–30

    Google Scholar 

  108. Mousavi SK, Ghaffari A (2021) Data cryptography in the internet of things using the artificial bee colony algorithm in a smart irrigation system. J Inf Security and Appl 61:102945

    Google Scholar 

  109. Bettoumi B, Bouallegue R (2021) Lc-dex: Lightweight and efficient compressed authentication based elliptic curve cryptography in multi-hop 6lowpan wireless sensor networks in hip-based internet of things. Sensors 21(21):7348

    Google Scholar 

  110. Kumari KS, Priya JL, Pravallika B, Bhargavi KM, Priya G (2023) Two stage secure medical data transmission for iot based e-health application. Turkish J of Comput and Math Educ (TURCOMAT) 14(2):352–364

    Google Scholar 

  111. Al-Zubaidie M (2023) Implication of lightweight and robust hash function to support key exchange in health sensor networks. Symmetry 15(1):152

    Google Scholar 

  112. Abd El-Aziz RM, Taloba AI, Alghamdi FA (2022) Quantum computing optimization technique for iot platform using modified deep residual approach. Alex Eng J 61(12):12497–12509

    Google Scholar 

  113. Shahid F, Khan A, Jeon G (2020) Post-quantum distributed ledger for internet of things. Comput & Electr Eng 83:106581

    Google Scholar 

  114. Yi H, Chi R, Huang X, Cai X, Nie Z (2022) Improving security of internet of vehicles based on post-quantum signatures with systolic divisions. ACM Trans Internet Technol 22(4):1–15

    Google Scholar 

  115. Qu Z, Wang K, Zheng M (2021) Secure quantum fog computing model based on blind quantum computation, J of Ambient Intell and Humanized Comput, 1–11

  116. Shen Y, Tang X, Zhang X, Zhou Y, Zou H (2022) A flexible continuous-wave quantum cryptography scheme with zero-trust security for internet of things. Int J Distrib Sens Netw 18(11):15501329221136978

    Google Scholar 

  117. Akleylek S, Soysaldı M, Lee W-K, Hwang SO, Wong DC-K (2020) Novel postquantum mq-based signature scheme for internet of things with parallel implementation. IEEE Internet Things J 8(8):6983–6994

    Google Scholar 

  118. Chikouche N, Cayrel P-L, Mboup EHM, Boidje BO (2019) A privacy-preserving code-based authentication protocol for internet of things. J Supercomput 75:8231–8261

    Google Scholar 

  119. Abd El-Latif AA, Abd-El-Atty B, Mazurczyk W, Fung C, Venegas-Andraca SE (2020) Secure data encryption based on quantum walks for 5g internet of things scenario. IEEE Trans Netw Serv Manage 17(1):118–131

    Google Scholar 

  120. Chen L, Chen Q, Zhao M, Chen J, Liu S, Zhao Y (2022) Ddka-qkdn: dynamic on-demand key allocation scheme for quantum internet of things secured by qkd network. Entropy 24(2):149

    MathSciNet  Google Scholar 

  121. Althobaiti OS, Dohler M (2021) Quantum-resistant cryptography for the internet of things based on location-based lattices. IEEE Access 9:133185–133203

    Google Scholar 

  122. Shamshad S, Riaz F, Riaz R, Rizvi SS, Abdulla S (2022) An enhanced architecture to resolve public-key cryptographic issues in the internet of things (iot), employing quantum computing supremacy. Sensors 22(21):8151

    Google Scholar 

  123. Xu D, Liu L, Zhang N, Dong M, Leung VC, Ritcey JA Nested hash access with post quantum encryption for mission-critical iot communications, IEEE Internet of Things J

  124. Xi P, Zhang X, Wang L, Liu W, Peng S (2022) A review of blockchain-based secure sharing of healthcare data. Appl Sci 12(15):7912

    Google Scholar 

  125. Zheng Z, Xie S, Dai H-N, Chen W, Chen X, Weng J, Imran M (2020) An overview on smart contracts: challenges, advances and platforms. Futur Gener Comput Syst 105:475–491

    Google Scholar 

  126. Peng L, Feng W, Yan Z, Li Y, Zhou X, Shimizu S (2021) Privacy preservation in permissionless blockchain: a survey. Digital Commun and Netw 7(3):295–307

    Google Scholar 

  127. Dib O, Brousmiche K-L, Durand A, Thea E, Hamida EB (2018) Consortium blockchains: overview, applications and challenges. Int J Adv Telecommun 11(1):51–64

    Google Scholar 

  128. Mamun Q (2022) Blockchain technology in the future of healthcare. Smart Health 23:100223

    Google Scholar 

  129. Pabitha P, Priya JC, Praveen R, Jagatheswari S (2023) Modchain: a hybridized secure and scaling blockchain framework for iot environment. Int J Inf Technol 15(3):1741–1754

    Google Scholar 

  130. Helliar CV, Crawford L, Rocca L, Teodori C, Veneziani M (2020) Permissionless and permissioned blockchain diffusion. Int J Inf Manage 54:102136

    Google Scholar 

  131. Kushwaha SS, Joshi S, Singh D, Kaur M, Lee H-N (2022) Ethereum smart contract analysis tools: a systematic review. IEEE Access 10:57037–57062

    Google Scholar 

  132. Al-Garadi MA, Mohamed A, Al-Ali AK, Du X, Ali I, Guizani M (2020) A survey of machine and deep learning methods for internet of things (iot) security. IEEE Commun Surv & Tutorials 22(3):1646–1685

    Google Scholar 

  133. Farooq U, Tariq N, Asim M, Baker T, Al-Shamma’a A (2022) Machine learning and the internet of things security: solutions and open challenges. J Parallel and Distributed Comput 162:89–104

    Google Scholar 

  134. Hussain F, Hussain R, Hassan SA, Hossain E (2020) Machine learning in iot security: current solutions and future challenges. IEEE Commun Surveys & Tutorials 22(3):1686–1721

    Google Scholar 

  135. Alzubaidi L, Zhang J, Humaidi AJ, Al-Dujaili A, Duan Y, Al-Shamma O, Santamaría J, Fadhel MA, Al-Amidie M, Farhan L (2021) Review of deep learning: concepts, cnn architectures, challenges, applications, future directions. J big Data 8:1–74

    Google Scholar 

  136. Thakkar A, Lohiya R (2021) A review on machine learning and deep learning perspectives of ids for iot: recent updates, security issues, and challenges. Archives of Comput Methods in Eng 28:3211–3243

    Google Scholar 

  137. Goldblum M, Tsipras D, Xie C, Chen X, Schwarzschild A, Song D, dry A, Li B, Goldstein T (2022) Dataset security for machine learning: data poisoning, backdoor attacks, and defenses. IEEE Trans Pattern Anal Mach Intell 45(2):1563–1580

    Google Scholar 

  138. Ahmad R, Alsmadi I (2021) Machine learning approaches to iot security: a systematic literature review. Internet of Things 14:100365

    Google Scholar 

  139. Ammar M, Washha M, Ramabhadran GS, Crispo B (2018) slimiot: Scalable lightweight attestation protocol for the internet of things, In: 2018 IEEE Conference on Dependable and Secure Computing (DSC), IEEE, pp 1–8

  140. Fang D, Qian Y, Hu RQ (2020) A flexible and efficient authentication and secure data transmission scheme for iot applications. IEEE Internet Things J 7(4):3474–3484

    Google Scholar 

  141. Dhanda SS, Singh B, Jindal P (2020) Lightweight cryptography: a solution to secure iot. Wireless Pers Commun 112:1947–1980

    Google Scholar 

  142. Lo’Ai AT, Somani TF (2016) More secure internet of things using robust encryption algorithms against side channel attacks, In: 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA). IEEE, pp 1–6

  143. Kumar A, Garhwal S (2021) State-of-the-art survey of quantum cryptography. Arch Comput Methods in Eng 28:3831–3868

    MathSciNet  Google Scholar 

  144. Chowdhury S, Covic A, Acharya RY, Dupee S, Ganji F, Forte D (2021) Physical security in the post-quantum era: A survey on side-channel analysis, random number generators, and physically unclonable functions, J of Cryptogr Eng, 1–37

  145. Wang H-W, Tsai C-W, Lin J, Yang C-W (2022) Authenticated semi-quantum key distribution protocol based on w states. Sensors 22(13):4998

    Google Scholar 

  146. Kumar A, Ottaviani C, Gill SS, Buyya R (2022) Securing the future internet of things with post-quantum cryptography. Secur and Privacy 5(2):e200

    Google Scholar 

  147. Bassi R, Zhang R, Gatto A, Tornatore M, Verticale G (2023) Quantum key distribution with trusted relay using an etsi-compliant software-defined controller, In: 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN), IEEE, pp 1–7

  148. Zeydan E, Turk Y, Aksoy B, Ozturk SB (2022) Recent advances in post-quantum cryptography for networks: A survey, In: 2022 Seventh International Conference On Mobile And Secure Services (MobiSecServ). IEEE, pp 1–8

Download references

Funding

Our work has not been funded and has been worked without financial support.

Author information

Authors and Affiliations

Authors

Contributions

All authors contributed to this paper.

Corresponding author

Correspondence to Sarra Cherbal.

Ethics declarations

Conflict of interest

We declare that we have no conflict of interest.

Ethical approval

Not applicable.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Springer Nature or its licensor (e.g. a society or other partner) holds exclusive rights to this article under a publishing agreement with the author(s) or other rightsholder(s); author self-archiving of the accepted manuscript version of this article is solely governed by the terms of such publishing agreement and applicable law.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Cherbal, S., Zier, A., Hebal, S. et al. Security in internet of things: a review on approaches based on blockchain, machine learning, cryptography, and quantum computing. J Supercomput 80, 3738–3816 (2024). https://doi.org/10.1007/s11227-023-05616-2

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-023-05616-2

Keywords

Navigation