Cybersecurity in the Age of IoT and Developing Frameworks for Securing Smart Devices and Networks
DOI:
https://doi.org/10.33050/corisinta.v2i1.64Keywords:
IoT cybersecurity, Multi-Layered Framework, Intrusion Detection, Data Encryption, Privacy ProtectionAbstract
The rapid proliferation of the Internet of Things (IoT) has significantly transformed various industries, enhancing automation and efficiency. However, it has also brought forth substantial cybersecurity challenges that threaten data integrity, user privacy, and system reliability. This study proposes a multi-layered cybersecurity framework to address these vulnerabilities by integrating robust security measures such as device authentication, data encryption, continuous network monitoring, and enhanced privacy protection. Employing a mixed methods research approach, the framework was rigorously validated through real world implementation in smart home environments, demonstrating tangible improvements in security resilience. Notably, the findings indicate a 40% reduction in threat response time, a 96% intrusion detection rate, and the complete elimination of data breaches post-implementation, emphasizing the framework’s effectiveness in mitigating cyber risks. Proactively addressing security concerns, this study provides valuable insights for key stakeholders, including device manufacturers, network operators, and policymakers, guiding them toward implementing stringent cybersecurity protocols to enhance trust and compliance across IoT ecosystems. Furthermore, the results highlight the necessity for continuous adaptation and innovation in cybersecurity strategies, ensuring that IoT deployments remain resilient against evolving cyber threats. As IoT adoption continues to accelerate across sectors such as healthcare, smart cities, and industrial automation, this research underscores the critical importance of a proactive, comprehensive security approach to safeguard connected infrastructures. Ultimately, the proposed framework serves as a blueprint for strengthening IoT security governance and fostering a safer digital ecosystem, reinforcing the importance of collaborative efforts in securing the future of interconnected technologies.
References
M. B. Begum, A. Yogeshwaran, N. Nagarajan, and P. Rajalakshmi, “Dynamic network security leveraging
efficient covinet with granger causality-inspired graph neural networks for data compression in cloud iot
devices,” Knowledge-Based Systems, vol. 309, p. 112859, 2025.
R. M. Czekster, T. Webber, L. B. Furstenau, and C. Marcon, “Dynamic risk assessment approach for
analysing cyber security events in medical iot networks,” Internet of Things, vol. 29, p. 101437, 2025.
R. Tarade and S. Das, “Cybersecurity in the age of al-enhancing defences for today’s threats,” Critical
Phishing Defense Strategies and Digital Asset Protection, p. 309, 2025.
S. G. Bhol, “Applications of multi criteria decision making methods in cyber security,” Cyber-Physical
Systems Security, pp. 233–258, 2025.
A. S. Bist, B. Rawat, A. G. Prawiyogi, N. Septiani, M. Fakhrezzy, D. B. Saputra et al., “Ai-enabled
blockchain for supply chain in agriculture,” in 2022 IEEE Creative Communication and Innovative Technology (ICCIT). IEEE, 2022, pp. 1–5.
Z. Buksh, N. A. Sharma, R. Chand, J. Kumar, and A. Shawkat Ali, “Cybersecurity challenges in smart
grid iot,” IoT for Smart Grid: Revolutionizing Electrical Engineering, pp. 175–206, 2025.
M. A. O. Ahmed, Y. AbdelSatar, R. Alotaibi, and O. Reyad, “Enhancing internet of things security using
performance gradient boosting for network intrusion detection systems,” Alexandria Engineering Journal,
vol. 116, pp. 472–482, 2025.
U. Bhimavarapu, “Advanced deep learning frameworks for cyber security in iot-based healthcare,” in
Critical Phishing Defense Strategies and Digital Asset Protection. IGI Global Scientific Publishing,
, pp. 295–308.
A. Kumar, R. Gupta, S. Kumar, K. Dutta, and M. Rani, “Securing iomt-based healthcare system: Issues,
challenges, and solutions,” Artificial Intelligence and Cybersecurity in Healthcare, pp. 17–56, 2025.
D. Manongga, U. Rahardja, I. Sembiring, Q. Aini, and A. Wahab, “Improving the air quality monitoring framework using artificial intelligence for environmentally conscious development,” HighTech and
Innovation Journal, vol. 5, no. 3, pp. 794–813, 2024.
K. Myers and C. R. Hinman, “The impact of cryptocurrency on the indonesian community’s economy,”
Blockchain Frontier Technology, vol. 3, no. 1, pp. 74–79, 2023.
M. Kalaiyarasi, S. Karthi, K. Kavya, V. Karthika, and S. Sharma, “Securing smart cities: Addressing cyber
security implications and collaborative measures,” in Artificial Intelligence and IoT for Cyber Security
Solutions in Smart Cities. Chapman and Hall/CRC, 2025, pp. 94–108.
N. S. Talwandi, S. Khare, P. Thakur, and R. Kumar, “Network security and data privacy in the 6g environment,” Network Security and Data Privacy in 6G Communication: Trends, Challenges, and Applications,
p. 211, 2025.
Geetanshi, H. Manocha, H. Babbar, and C. Mangla, “Securing the internet of things: Cybersecurity
challenges, strategies, and future directions in the era of 5g and edge computing,” Current and Future
Cellular Systems: Technologies, Applications, and Challenges, pp. 89–106, 2025.
E. A. Beldiq, B. Callula, N. A. Yusuf, and A. R. A. Zahra, “Unlocking organizational potential: Assessing
the impact of technology through smartpls in advancing management excellence,” APTISI Transactions
on Management, vol. 8, no. 1, pp. 40–48, 2024.
S. K. Pendyala, “Strengthening healthcare cybersecurity: Leveraging multi-cloud and ai solutions,” J
Comp Sci Appl Inform Technol, vol. 10, no. 1, pp. 1–8, 2025.
O. O. Amoo, F. Osasona, A. Atadoga, B. S. Ayinla, O. A. Farayola, T. O. Abrahams et al., “Cybersecurity
threats in the age of iot: A review of protective measures,” International Journal of Science and Research
Archive, vol. 11, no. 1, pp. 1304–1310, 2024.
S. M. Dickson and I. P. OKECHUKWU, “Cyber security in the age of the internet of things, constraints,
and solutions,” Journal of Digital Learning and Distance Education, vol. 2, no. 11, pp. 829–837, 2024.
L. W. Ming, J. Anderson, F. Hidayat, F. D. Yulian, and N. Septiani, “Ai as a driver of efficiency in waste
management and resource recovery,” International Transactions on Artificial Intelligence, vol. 2, no. 2,
pp. 128–134, 2024.
G. S. Nadella and H. Gonaygunta, “Enhancing cybersecurity with artificial intelligence: Predictive techniques and challenges in the age of iot,” International journal of science and engineering applications,
vol. 13, no. 04, pp. 30–33, 2024.
H. Rehan, “Ai-driven cloud security: The future of safeguarding sensitive data in the digital age,” Journal
of Artificial Intelligence General science (JAIGS) ISSN: 3006-4023, vol. 1, no. 1, pp. 132–151, 2024.
A. Felix, S. J. Salim, J. M. Karsten et al., “Pemanfaatan teknologi layanan fine dining untuk meningkatkan
customer experience dan influence satisfaction: Utilization of fine dining service technology to improve
customer experience and influence satisfaction,” Technomedia Journal, vol. 8, no. 3, pp. 420–433, 2024.
A. Roy, A. Dhar, and S. S. Tinny, “Strengthening iot cybersecurity with zero trust architecture: A comprehensive review,” Journal of Computer Science and Information Technology, vol. 1, no. 1, pp. 25–50,
A. Enemosah and O. G. Ifeanyi, “Cloud security frameworks for protecting iot devices and scada systems
in automated environments,” World Journal of Advanced Research and Reviews, vol. 22, no. 03, pp.
–2252, 2024.
C. S. Bangun, T. Suhara, N. Septiani, A. Williams et al., “Influence of third party funds on credit distribution,” ADI Journal on Recent Innovation, vol. 4, no. 1, pp. 34–42, 2022.
U. Rahardja, V. Meilinda, R. A. Sunarjo, A. Williams, and S. A. Anjani, “Mapping the information and
communication technology research landscape through bibliometric analysis,” in 2024 3rd International
Conference on Creative Communication and Innovative Technology (ICCIT). IEEE, 2024, pp. 1–8.
S. S. Sefati, R. Craciunescu, B. Arasteh, S. Halunga, O. Fratu, and I. Tal, “Cybersecurity in a scalable
smart city framework using blockchain and federated learning for internet of things (iot),” Smart Cities,
vol. 7, no. 5, pp. 2802–2841, 2024.
B. Desai, K. Patil, I. Mehta, and A. Patil, “A secure communication framework for smart city infrastructure
leveraging encryption, intrusion detection, and blockchain technology,” Advances in Computer Sciences,
vol. 7, no. 1, 2024.
R. R. Gopireddy, “Securing the future: The convergence of cybersecurity, ai, and iot in a world dominated
by intelligent machines,” European Journal of Advances in Engineering and Technology, vol. 11, no. 8,
pp. 91–95, 2024.
N. Lutfiani, A. Ivanov, N. P. L. Santoso, S. V. Sihotang, and S. Purnama, “E-commerce growth plan for
msmes’ sustainable development enhancement,” Journal of Computer Science and Technology Application, vol. 1, no. 1, pp. 80–86, 2024.
R. A. Fauzi, I. Nugroho, J. I. Saputro, D. Mahesa, and M. D. Fadhillah, “Challenges of bitcoin blockchain
technology in real-world apps,” Blockchain Frontier Technology, vol. 2, no. 2, pp. 36–43, 2023.
Y. Kannan, “Impact of internet of things (iot) devices on network security at financial institutions,” Authorea Preprints, 2024.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Eli Ratih Rahayu, Ariesya Aprillia, Ramzi Zainum Ikhsan, Alfri Adiwijaya, Aryan Kumara (Authors)

This work is licensed under a Creative Commons Attribution 4.0 International License.


