IOT SECURITY AND PRIVACY CHALLENGES: A REVIEW

Authors

  • B. Sankaraiah Author
  • Vemula Nikitha Author
  • Syed Abdul Haq Author
  • Dr. Syed Umar Author

DOI:

https://doi.org/10.65009/c9d6q925

Keywords:

Internet of Things (IOT), Security and Privacy Challenges, Data-Sharing,,

Abstract

 The Internet of Things (IOT) aims to transform our surroundings—including our houses and 
flats, places of employment, and cars—into something smarter, more measurable, and more hospitable. 
Voice technology can make it easier to play music, create countdowns, or receive information. It is easier 
to monitor actions both inside and outside, as well as to recognize and engage with visitors, thanks to 
surveillance cameras. Intellectual light bulbs could perhaps give the illusion as if we are parents’ house 
even when we are not, but instead smart devices can help us warm heat our homes before we arrive. When 
we look outside the house, sensor nodes can tell us how noisy, frustrating, or contaminated our enviroment 
But several of these developments could have a big impact on our right to privacy. Users are likely to 
interact with internet-enabled gadgets for the first time through home automation, another market where 
the main tech companies are engaged in strong competition. Examples include smart sensors, smart 
lighting fixtures, camcorders, smart thermostats, and the smart fridges. The issues related to the Internet 
of Things, health, and privacy are discussed in this paper, along with suggestions for IoT solutions. 

,

References

Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,

"Multi-Objective Genetic Algorithms for Secure Routing and Data Privacy in IoT Networks",

International Journal of Communication Networks and Information Security (IJCNIS), (2020), 12(3),

–643.

Nandipati Sai Akash, Naveen Sai Bommina, Uppu Lokesh, Hussain Syed, Syed Umar, "Optimized

Block Chain-Enabled Security Mechanism for IoT Using Ant Colony Optimization", International

Journal on Recent and Innovation Trends in Computing and Communication, (2023), 11(10), 1226

Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,

"Privacy-Preserving Federated Learning for IoT Devices with Secure Model Optimization",

International Journal of Communication Networks and Information Security (IJCNIS), (2021), 13(2),

–405.

Naveen Sai Bommina, Uppu Lokesh, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Optimizing AI-Driven Security Protocols in IoT Networks Using Metaheuristic Algorithms",

International Journal of Intelligent Systems and Applications in Engineering, IJISAE, 2024, 12(23s),

–3347.

Naveen Sai Bommina, Nandipati Sai Akash, Uppu Lokesh, Dr. Hussain Syed, Dr. Syed Umar, "A

Hybrid Optimization Framework for Enhancing IoT Security via AI-based Anomaly Detection",

International Journal on Recent and Innovation Trends in Computing and Communication, ISSN:

-8169 Volume: 11 Issue: 3.

Uppu Lokesh , Naveen Sai Bommina , Nandipati Sai Akash , Dr. Hussain Syed , Dr. Syed Umar.

(2021). Deep Reinforcement Learning with Genetic Algorithm Tuning for Intrusion Detection in IoT

Systems. International Journal of Communication Networks and Information Security (IJCNIS),

(3), 582–595.

Nandipati Sai Akash, Uppu Lokesh, Naveen Sai Bommina, Hussain Syed, Syed Umar, "Swarm

Intelligence-Based Hyperparameter Optimization for AI-Powered IoT Threat Detection",

International Journal of Intelligent Systems and Applications in Engineering, (2024), 12(17s), 941.

Uppu Lokesh, Naveen Sai Bommina, Nandipati Sai Akash, Dr. Hussain Syed, Dr. Syed Umar,

"Designing Energy-Efficient and Secure IoT Architectures Using Evolutionary Optimization

Algorithms", International Journal of Applied Engineering & Technology, Vol. 4 No.2, September,

Usman, M., Zubair, M., Hussein, H. S., Wajid, M., Farrag, M., Ali, S. J., ... & Habeeb, M. S. (2021).

Empirical mode decomposition for analysis and filtering of speech signals. IEEE Canadian Journal of

Electrical and Computer Engineering, 44(3), 343-349.

Habeeb, M. S., & Babu, T. R. (2024). MS-CFFS: Multistage Coarse and Fine Feature Selection for

Advanced Anomaly Detection in IoT Security Networks. International Journal of Electrical and

Electronics Research, 12(3), 780-790.

Ahmad, Z., Khan, A. S., Aqeel, S., Julaihi, A. A., Tarmizi, S., Annuar, N., & Habeeb, M. S. (2022,

May). S-ADS: spectrogram image-based anomaly detection system for IoT networks. In 2022

Applied Informatics International Conference (AiIC) (pp. 105-110). IEEE.

HABEEB, M. S., & BABU, T. R. (2024). WOA-SA: OPTIMIZING NIDS WITH ENHANCED

DEEP LEARNING FOR ZERO-DAY ATTACK DETECTION. Journal of Jilin University

(Engineering and Technology Edition).

Divya Rohatgi, Dr. Tulika Pandey, "Regression Test Selection Framework for Web Services",

INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 9,

ISSUE 03, MARCH 2020.

R. Gnanakumaran, Divya Rohatgi, A K Sampath, Nidhi Nagar, D. Amuthaguka, Raj Kumar Gupta,

"Robust Extreme Learning Machine based Sentiment Analysis and Classification", 2023 5th

International Conference on Smart Systems and Inventive Technology (ICSSIT), (2023), DOI:

1109/ICSSIT55814.2023.10061017.

Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,

"Multi-Objective Genetic Algorithms for Secure Routing and Data Privacy in IoT Networks",

International Journal of Communication Networks and Information Security (IJCNIS), (2020), 12(3),

–643.

Nandipati Sai Akash, Naveen Sai Bommina, Uppu Lokesh, Hussain Syed, Syed Umar, "Optimized

Block Chain-Enabled Security Mechanism for IoT Using Ant Colony Optimization", International

Journal on Recent and Innovation Trends in Computing and Communication, (2023), 11(10), 1226

Naveen Sai Bommina , Nandipati Sai Akash, Uppu Lokesh , Dr. Hussain Syed , Dr. Syed Umar,

"Privacy-Preserving Federated Learning for IoT Devices with Secure Model Optimization",

International Journal of Communication Networks and Information Security (IJCNIS), (2021), 13(2),

–405.

Downloads.

Published

2025-06-17

Issue

Section

Articles

How to Cite

IOT SECURITY AND PRIVACY CHALLENGES: A REVIEW . (2025). Phoenix: International Multidisciplinary Research Journal ( Peer Reviewed High Impact Journal ), 3(2), 132-139. https://doi.org/10.65009/c9d6q925