IoT SECURITY: AUTHENTICATION, PRIVACY, AND MODERN PROTOCOLS

Authors

  • Zulaykho Kabulova Department of Information Security Tashkent University of Information Technologies Tashkent, Uzbekistan

Keywords:

IoT security, artificial intelligence, authentication, network threats, anomaly detection, machine learning, cryptography, cybersecurity.

Abstract

This article analyzes the role of artificial intelligence (AI) technologies in ensuring the security of the Internet of Things (IoT). The widespread use of IoT devices increases their vulnerability to cybersecurity threats. The study examines key issues such as authentication, data privacy, and network security, and examines the potential for AI-based threat detection, security monitoring automation, and adaptive cryptographic protocols to address them. The effectiveness of traditional security approaches and modern AI-based methods is compared. The results of the study show that AI-enhanced security mechanisms can significantly increase the ability to detect and eliminate threats in real-time in the IoT environment. Current limitations of AI-based security approaches and recommendations for future technological improvements are provided.

References

Gartner, “IoT Growth Forecast,” 2022. [Online]. Available: https://www.gartner.com.

M. Conti, et al., “Internet of Things Security and Forensics,” Future Generation Computer Systems, vol. 78, pp. 544–556, 2021.

Cisco, “Annual Cybersecurity Report,” 2023. [Online]. Available: https://www.cisco.com.

Kaspersky Lab, “IoT Threat Landscape,” 2022. [Online]. Available: https://www.kaspersky.com.

A. Rahman et al., “AI-Driven Intrusion Detection Systems for IoT Networks,” Security and Privacy in IoT, vol. 19, pp. 45–58, 2022.

OWASP, “Top 10 IoT Security Vulnerabilities,” 2023. [Online]. Available: https://owasp.org.

IEEE Xplore, “Artificial Intelligence in IoT Security,” 2023. [Online]. Available: https://ieeexplore.ieee.org.

X. Yang et al., “Blockchain and AI Integration for IoT Security,” Future Generation Computer Systems, vol. 125, pp. 55–73, 2023.

D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM Journal on Computing, vol. 32, pp. 586–615, 2022.

Cloudflare, “DDoS Protection and Mitigation Strategies,” 2023. [Online]. Available: https://www.cloudflare.com

Google Cloud Security, “AI-Powered Threat Detection in IoT,” 2023. [Online]. Available: https://cloud.google.com/security

IBM X-Force, “AI and Blockchain for Cybersecurity,” 2022. [Online]. Available: https://www.ibm.com/security.

NIST, “Cybersecurity Framework for IoT,” 2021. [Online]. Available: https://www.nist.gov.

Cloudflare, “AI-Based DDoS Protection,” 2023. [Online]. Available: https://www.cloudflare.com.

A. Shamir, “Elliptic Curve Cryptography and IoT Security,” Computers & Security, vol. 104, pp. 1–14, 2022.

X. Li, Y. Liu, and H. Wang, “Blockchain for IoT Authentication,” Journal of Network and Computer Applications, vol. 173, pp. 102–116, 2023.

J. Kurose and K. Ross, Computer Networking: A Top-Down Approach, 8th ed. Pearson, 2021.

IEEE Xplore, “Artificial Intelligence in IoT Security,” 2023. [Online]. Available: https://ieeexplore.ieee.org.

D. Boneh and M. Franklin, “Identity-Based Encryption from the Weil Pairing,” SIAM Journal on Computing, vol. 32, pp. 586–615, 2022.

Cloudflare, “DDoS Protection and Mitigation Strategies,” 2023. [Online]. Available: https://www.cloudflare.com.

Published

2025-04-03

How to Cite

Zulaykho Kabulova. (2025). IoT SECURITY: AUTHENTICATION, PRIVACY, AND MODERN PROTOCOLS. Ethiopian International Journal of Multidisciplinary Research, 12(03), 416–422. Retrieved from https://eijmr.org/index.php/eijmr/article/view/2813