Table 14 Review of security techniques in SIoT.
Ref. | Domain | Purpose | Threat tackled | Core tech | Proposed method | Strengths | Limitations | Future work |
|---|---|---|---|---|---|---|---|---|
Smart Grid | Quantum-safe auth for meters | Replay, spoofing, quantum threats | RSA + One-Time Pad | Session-based dynamic keying | Quantum-safe, prevents spoofing | Key sync, scaling limits | Optimize for IoT; enable distributed support | |
Healthcare | Quantum-safe EHR encryption | Quantum threats, tampering, key misuse | Blockchain, ECDSA, Dilithium | Three-phase hybrid encryption | Strong privacy, quantum safety | Overhead, limited scalability | Combine with AI/IoT for efficiency | |
Social IoT | Access control via social trust | Tampering, privacy leaks | Blockchain, Smart Contracts | Relationship-based access rules | Granular access, trust-aware sharing | Latency, complex contracts | Improve dynamic trust updates | |
Healthcare | EHR auth and validation | Tampering, unauthorized access | Blockchain, SBT, IPFS, DL | SBT-based selective disclosure | Fast EHR validation, privacy, decentralization | SBTs non-transferable, key loss | Scale and apply cross-industry | |
Smart Home Energy | Real-time ABAC via hybrid blockchain | Spoofing, trust abuse | Fabric, Besu, smart contracts, KYC | Modular contracts, trust scoring | Supports zero-trust, adaptive control | Setup complexity, recalibration delay | Add edge AI, FL, DID features | |
MAGDM Systems | Enhance consensus via trust | Incomplete trust, low agreement | SNA, trust network, confidence model | Trust feedback via mediator | Better consensus accuracy, real-world proof | Needs accurate input, high compute | Apply to real-time, large-scale cases | |
IoT Cloud Offloading | Reduce cloud data transfer load | Latency, energy, bandwidth | Change detection, relational encoding | Only send when change detected | Less data, retains utility | Threshold tuning, depends on cloud decode | Extend to other data types | |
Smart Gateway Security | Secure MQTT-SN gateway using DTLS | Eavesdropping, MITM, replay, spoofing, rogue auth, DoS | DTLS 1.2, KMS, multithreading, ClientList | Monolithic, concurrent SecGW with DTLS + mutual auth via KMS | Encrypted SN-GW hop; resilient, scalable, supports multiplexing | Extra memory, slight delay; needs pre-config/KMS | Explore non-GW MQTT-SN security to reduce compute load |