Table 14 Review of security techniques in SIoT.

From: A comprehensive survey on securing the social internet of things: protocols, threat mitigation, technological integrations, tools, and performance metrics

Ref.

Domain

Purpose

Threat tackled

Core tech

Proposed method

Strengths

Limitations

Future work

185

Smart Grid

Quantum-safe auth for meters

Replay, spoofing, quantum threats

RSA + One-Time Pad

Session-based dynamic keying

Quantum-safe, prevents spoofing

Key sync, scaling limits

Optimize for IoT; enable distributed support

26

Healthcare

Quantum-safe EHR encryption

Quantum threats, tampering, key misuse

Blockchain, ECDSA, Dilithium

Three-phase hybrid encryption

Strong privacy, quantum safety

Overhead, limited scalability

Combine with AI/IoT for efficiency

25

Social IoT

Access control via social trust

Tampering, privacy leaks

Blockchain, Smart Contracts

Relationship-based access rules

Granular access, trust-aware sharing

Latency, complex contracts

Improve dynamic trust updates

186

Healthcare

EHR auth and validation

Tampering, unauthorized access

Blockchain, SBT, IPFS, DL

SBT-based selective disclosure

Fast EHR validation, privacy, decentralization

SBTs non-transferable, key loss

Scale and apply cross-industry

187

Smart Home Energy

Real-time ABAC via hybrid blockchain

Spoofing, trust abuse

Fabric, Besu, smart contracts, KYC

Modular contracts, trust scoring

Supports zero-trust, adaptive control

Setup complexity, recalibration delay

Add edge AI, FL, DID features

188

MAGDM Systems

Enhance consensus via trust

Incomplete trust, low agreement

SNA, trust network, confidence model

Trust feedback via mediator

Better consensus accuracy, real-world proof

Needs accurate input, high compute

Apply to real-time, large-scale cases

189

IoT Cloud Offloading

Reduce cloud data transfer load

Latency, energy, bandwidth

Change detection, relational encoding

Only send when change detected

Less data, retains utility

Threshold tuning, depends on cloud decode

Extend to other data types

190

Smart Gateway Security

Secure MQTT-SN gateway using DTLS

Eavesdropping, MITM, replay, spoofing, rogue auth, DoS

DTLS 1.2, KMS, multithreading, ClientList

Monolithic, concurrent SecGW with DTLS + mutual auth via KMS

Encrypted SN-GW hop; resilient, scalable, supports multiplexing

Extra memory, slight delay; needs pre-config/KMS

Explore non-GW MQTT-SN security to reduce compute load