Cybersecurity in the Age of IoT and Developing Frameworks for Securing Smart Devices and Networks

Authors

DOI:

https://doi.org/10.33050/corisinta.v2i1.64

Keywords:

IoT cybersecurity, Multi-Layered Framework, Intrusion Detection, Data Encryption, Privacy Protection

Abstract

The rapid proliferation of the Internet of Things (IoT) has significantly transformed various industries, enhancing automation and efficiency. However, it has also brought forth substantial cybersecurity challenges that threaten data integrity, user privacy, and system reliability. This study proposes a multi-layered cybersecurity framework to address these vulnerabilities by integrating robust security measures such as device authentication, data encryption, continuous network monitoring, and enhanced privacy protection. Employing a mixed methods research approach, the framework was rigorously validated through real world implementation in smart home environments, demonstrating tangible improvements in security resilience. Notably, the findings indicate a 40% reduction in threat response time, a 96% intrusion detection rate, and the complete elimination of data breaches post-implementation, emphasizing the framework’s effectiveness in mitigating cyber risks. Proactively addressing security concerns, this study provides valuable insights for key stakeholders, including device manufacturers, network operators, and policymakers, guiding them toward implementing stringent cybersecurity protocols to enhance trust and compliance across IoT ecosystems. Furthermore, the results highlight the necessity for continuous adaptation and innovation in cybersecurity strategies, ensuring that IoT deployments remain resilient against evolving cyber threats. As IoT adoption continues to accelerate across sectors such as healthcare, smart cities, and industrial automation, this research underscores the critical importance of a proactive, comprehensive security approach to safeguard connected infrastructures. Ultimately, the proposed framework serves as a blueprint for strengthening IoT security governance and fostering a safer digital ecosystem, reinforcing the importance of collaborative efforts in securing the future of interconnected technologies.

References

M. B. Begum, A. Yogeshwaran, N. Nagarajan, and P. Rajalakshmi, “Dynamic network security leveraging

efficient covinet with granger causality-inspired graph neural networks for data compression in cloud iot

devices,” Knowledge-Based Systems, vol. 309, p. 112859, 2025.

R. M. Czekster, T. Webber, L. B. Furstenau, and C. Marcon, “Dynamic risk assessment approach for

analysing cyber security events in medical iot networks,” Internet of Things, vol. 29, p. 101437, 2025.

R. Tarade and S. Das, “Cybersecurity in the age of al-enhancing defences for today’s threats,” Critical

Phishing Defense Strategies and Digital Asset Protection, p. 309, 2025.

S. G. Bhol, “Applications of multi criteria decision making methods in cyber security,” Cyber-Physical

Systems Security, pp. 233–258, 2025.

A. S. Bist, B. Rawat, A. G. Prawiyogi, N. Septiani, M. Fakhrezzy, D. B. Saputra et al., “Ai-enabled

blockchain for supply chain in agriculture,” in 2022 IEEE Creative Communication and Innovative Technology (ICCIT). IEEE, 2022, pp. 1–5.

Z. Buksh, N. A. Sharma, R. Chand, J. Kumar, and A. Shawkat Ali, “Cybersecurity challenges in smart

grid iot,” IoT for Smart Grid: Revolutionizing Electrical Engineering, pp. 175–206, 2025.

M. A. O. Ahmed, Y. AbdelSatar, R. Alotaibi, and O. Reyad, “Enhancing internet of things security using

performance gradient boosting for network intrusion detection systems,” Alexandria Engineering Journal,

vol. 116, pp. 472–482, 2025.

U. Bhimavarapu, “Advanced deep learning frameworks for cyber security in iot-based healthcare,” in

Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global Scientific Publishing,

, pp. 295–308.

A. Kumar, R. Gupta, S. Kumar, K. Dutta, and M. Rani, “Securing iomt-based healthcare system: Issues,

challenges, and solutions,” Artificial Intelligence and Cybersecurity in Healthcare, pp. 17–56, 2025.

D. Manongga, U. Rahardja, I. Sembiring, Q. Aini, and A. Wahab, “Improving the air quality monitoring framework using artificial intelligence for environmentally conscious development,” HighTech and

Innovation Journal, vol. 5, no. 3, pp. 794–813, 2024.

K. Myers and C. R. Hinman, “The impact of cryptocurrency on the indonesian community’s economy,”

Blockchain Frontier Technology, vol. 3, no. 1, pp. 74–79, 2023.

M. Kalaiyarasi, S. Karthi, K. Kavya, V. Karthika, and S. Sharma, “Securing smart cities: Addressing cyber

security implications and collaborative measures,” in Artificial Intelligence and IoT for Cyber Security

Solutions in Smart Cities. Chapman and Hall/CRC, 2025, pp. 94–108.

N. S. Talwandi, S. Khare, P. Thakur, and R. Kumar, “Network security and data privacy in the 6g environment,” Network Security and Data Privacy in 6G Communication: Trends, Challenges, and Applications,

p. 211, 2025.

Geetanshi, H. Manocha, H. Babbar, and C. Mangla, “Securing the internet of things: Cybersecurity

challenges, strategies, and future directions in the era of 5g and edge computing,” Current and Future

Cellular Systems: Technologies, Applications, and Challenges, pp. 89–106, 2025.

E. A. Beldiq, B. Callula, N. A. Yusuf, and A. R. A. Zahra, “Unlocking organizational potential: Assessing

the impact of technology through smartpls in advancing management excellence,” APTISI Transactions

on Management, vol. 8, no. 1, pp. 40–48, 2024.

S. K. Pendyala, “Strengthening healthcare cybersecurity: Leveraging multi-cloud and ai solutions,” J

Comp Sci Appl Inform Technol, vol. 10, no. 1, pp. 1–8, 2025.

O. O. Amoo, F. Osasona, A. Atadoga, B. S. Ayinla, O. A. Farayola, T. O. Abrahams et al., “Cybersecurity

threats in the age of iot: A review of protective measures,” International Journal of Science and Research

Archive, vol. 11, no. 1, pp. 1304–1310, 2024.

S. M. Dickson and I. P. OKECHUKWU, “Cyber security in the age of the internet of things, constraints,

and solutions,” Journal of Digital Learning and Distance Education, vol. 2, no. 11, pp. 829–837, 2024.

L. W. Ming, J. Anderson, F. Hidayat, F. D. Yulian, and N. Septiani, “Ai as a driver of efficiency in waste

management and resource recovery,” International Transactions on Artificial Intelligence, vol. 2, no. 2,

pp. 128–134, 2024.

G. S. Nadella and H. Gonaygunta, “Enhancing cybersecurity with artificial intelligence: Predictive techniques and challenges in the age of iot,” International journal of science and engineering applications,

vol. 13, no. 04, pp. 30–33, 2024.

H. Rehan, “Ai-driven cloud security: The future of safeguarding sensitive data in the digital age,” Journal

of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, vol. 1, no. 1, pp. 132–151, 2024.

A. Felix, S. J. Salim, J. M. Karsten et al., “Pemanfaatan teknologi layanan fine dining untuk meningkatkan

customer experience dan influence satisfaction: Utilization of fine dining service technology to improve

customer experience and influence satisfaction,” Technomedia Journal, vol. 8, no. 3, pp. 420–433, 2024.

A. Roy, A. Dhar, and S. S. Tinny, “Strengthening iot cybersecurity with zero trust architecture: A comprehensive review,” Journal of Computer Science and Information Technology, vol. 1, no. 1, pp. 25–50,

A. Enemosah and O. G. Ifeanyi, “Cloud security frameworks for protecting iot devices and scada systems

in automated environments,” World Journal of Advanced Research and Reviews, vol. 22, no. 03, pp.

–2252, 2024.

C. S. Bangun, T. Suhara, N. Septiani, A. Williams et al., “Influence of third party funds on credit distribution,” ADI Journal on Recent Innovation, vol. 4, no. 1, pp. 34–42, 2022.

U. Rahardja, V. Meilinda, R. A. Sunarjo, A. Williams, and S. A. Anjani, “Mapping the information and

communication technology research landscape through bibliometric analysis,” in 2024 3rd International

Conference on Creative Communication and Innovative Technology (ICCIT). IEEE, 2024, pp. 1–8.

S. S. Sefati, R. Craciunescu, B. Arasteh, S. Halunga, O. Fratu, and I. Tal, “Cybersecurity in a scalable

smart city framework using blockchain and federated learning for internet of things (iot),” Smart Cities,

vol. 7, no. 5, pp. 2802–2841, 2024.

B. Desai, K. Patil, I. Mehta, and A. Patil, “A secure communication framework for smart city infrastructure

leveraging encryption, intrusion detection, and blockchain technology,” Advances in Computer Sciences,

vol. 7, no. 1, 2024.

R. R. Gopireddy, “Securing the future: The convergence of cybersecurity, ai, and iot in a world dominated

by intelligent machines,” European Journal of Advances in Engineering and Technology, vol. 11, no. 8,

pp. 91–95, 2024.

N. Lutfiani, A. Ivanov, N. P. L. Santoso, S. V. Sihotang, and S. Purnama, “E-commerce growth plan for

msmes’ sustainable development enhancement,” Journal of Computer Science and Technology Application, vol. 1, no. 1, pp. 80–86, 2024.

R. A. Fauzi, I. Nugroho, J. I. Saputro, D. Mahesa, and M. D. Fadhillah, “Challenges of bitcoin blockchain

technology in real-world apps,” Blockchain Frontier Technology, vol. 2, no. 2, pp. 36–43, 2023.

Y. Kannan, “Impact of internet of things (iot) devices on network security at financial institutions,” Authorea Preprints, 2024.

Downloads

Published

2025-02-27

Issue

Section

Articles

How to Cite

Cybersecurity in the Age of IoT and Developing Frameworks for Securing Smart Devices and Networks. (2025). Journal of Computer Science and Technology Application, 2(1), 46-54. https://doi.org/10.33050/corisinta.v2i1.64