Integration of Artificial Intelligence, Blockchain, and Quantum Cryptography for Securing the Industrial Internet of Things (IIoT): Recent Advancements and Future Trends
Main Article Content
Abstract
The swift growth of the Industrial Internet of Things (IIoT) offers tremendous potential to boost productivity, facilitate real-time decision-making, and automate procedures in various industries. However, as industries increasingly adopt IIoT, they face paramount data security, privacy, and system integrity challenges. Artificial intelligence (AI), Blockchain, and quantum cryptography are gaining significant attention as solutions to address these challenges. This paper comprehensively surveys advanced technologies and their potential applications for securing IIoT ecosystems. It reviews findings from 196 sources, including peer-reviewed journal articles, conference papers, books, book chapters, reports, and websites published between 2021 and 2025. The survey draws insights from leading platforms like Springer Nature, ACM Digital Library, Frontiers, Wiley Online Library, Taylor & Francis, IGI Global, Springer, ScienceDirect, MDPI, IEEE Xplore Digital Library, and Google Scholar. This paper explores AI-driven approaches to anomaly detection, predictive maintenance, and adaptive security mechanisms, demonstrating how machine learning (ML) and deep learning (DL) can identify and mitigate threats instantly. It also examines Blockchain technology, emphasizing its decentralized nature, immutability, and ability to secure data sharing and authentication within IIoT networks. The paper discusses quantum cryptography, which utilizes quantum mechanics for theoretically unbreakable encryption, ensuring secure communications in highly sensitive industrial environments. The integration of these technologies is analyzed to create a multi-layered defense against cyber threats, highlighting challenges in scalability, interoperability, and computational overhead. Finally, the paper reviews the current research, limitations and challenges, and future directions for securing IIoT with these advanced technologies. This survey offers valuable insights to researchers, engineers, and industry practitioners working to secure the expanding IIoT infrastructure.
Article Details
Issue
Section

This work is licensed under a Creative Commons Attribution 4.0 International License.
How to Cite
References
[1] P. K. Dutta, S. M. El-kenawy, G. Ali, and K. Dhoska, “An Energy Consumption Monitoring and Control System in Buildings using Internet of Things,” Babylonian Journal of Internet of Things, vol. 2023, pp. 38–47, 2023. https://doi.org/10.58496/BJIoT/2023/006
[2] M. M. Mijwil, I. Bala, G. Ali, M. Aljanabi, M. Abotaleb, R. Doshi, . . . E.-S. M. El-Kenawy, “Sensing of Type 2 Diabetes Patients Based on Internet of Things Solutions: An Extensive Survey,” In K. K. Hiran, R. Doshi, and M. Patel (Eds.), Modern Technology in Healthcare and Medical Education: Blockchain, IoT, AR, and VR (pp. 34-46). IGI Global, 2024. doi:10.4018/979-8-3693-5493-3.ch003
[3] X. Mu, and M. F. Antwi-Afari, “The applications of Internet of Things (IoT) in industrial management: a science mapping review,” International Journal of Production Research, vol. 62, no. 5, pp. 1928–1952, 2024. https://doi.org/10.1080/00207543.2023.2290229
[4] T. Gaber, J. B. Awotunde, S. O. Folorunso, S. A. Ajagbe, and E. Eldesouky, “Industrial internet of things intrusion detection method using machine learning and optimization techniques,” Wireless Communications and Mobile Computing, vol. 2023, pp. 1–15, 2023. https://doi.org/10.1155/2023/3939895
[5] I. B. Ababio, J. Bieniek, M. Rahouti, T. Hayajneh, M. Aledhari, D. C. Verma, and A. Chehri, “A Blockchain-Assisted federated learning framework for secure and Self-Optimizing digital twins in industrial IoT,” Future Internet, vol. 17, no. 1, pp. 1–20, 2025. https://doi.org/10.3390/fi17010013
[6] K. Hassini, and M. Lazaar, “Enhancing Industrial-IoT cybersecurity through generative models and convolutional neural networks,” In Lecture notes in networks and systems (pp. 543–558). Springer, 2024. https://doi.org/10.1007/978-3-031-74491-4_41
[7] I. Bala, M. M. Mijwil, G. Ali, and E. Sadıkoğlu, “Analyzing the Connection Between AI and Industry 4.0 from a Cybersecurity Perspective: Defending the Smart Revolution,” Mesopotamian Journal of Big Data, vol. 2023, pp. 63–69, 2023. https://doi.org/10.58496/mjbd/2023/009
[8] S. Thapar, D. Mishra, and R. Saini, “Secure transmission in NOMA-Enabled industrial IoT with Resource-Constrained untrusted devices,” IEEE Transactions on Industrial Informatics, vol. 20, no. 1, pp. 411–420, 2024. https://doi.org/10.1109/tii.2023.3263276
[9] M. I. Joha, M. M. Rahman, M. S. Nazim, and Y. M. Jang, “A Secure IIoT Environment That Integrates AI-Driven Real-Time Short-Term Active and Reactive Load Forecasting with Anomaly Detection: A Real-World Application,” Sensors, vol. 24, no. 23, pp. 1–33, 2024. https://doi.org/10.3390/s24237440
[10] S. Lee, and S. Park, “Mobility-Assisted Digital Twin Network Optimization over Industrial Internet of Things,” Applied Sciences, vol. 14, no. 19, pp. 1–13, 2024. https://doi.org/10.3390/app14199090
[11] M. A. Jarwar, J. W. C. FREng, and S. Ali, “Modelling Industrial IoT Security Using Ontologies: A Systematic Review,” IEEE Open Journal of the Communications Society, pp. 1–34, 2025. https://doi.org/10.1109/ojcoms.2025.3532224
[12] H. H. Azeez, M. Sharbaf, B. Zamani, and S. Kolahdouz-Rahimi, “Applying pattern language to enhance IIoT system design and Integration: From Theory to practice,” Information, vol. 15, no. 10, pp. 1–23, 2024. https://doi.org/10.3390/info15100595
[13] V. R. Kebande, and R. A. Ikuesan, “Standardizing Industrial Internet of Things (IIoT) forensic processes,” Security and Privacy, vol. 8, no. 1, pp. 1–17, 2025. https://doi.org/10.1002/spy2.485
[14] F. T. Fera, and C. Spandonidis, “An Artificial Intelligence and industrial Internet of Things-Based framework for sustainable hydropower plant operations,” Smart Cities, vol. 7, no. 1, pp. 496–517, 2024. https://doi.org/10.3390/smartcities7010020
[15] S. Banerjee, P. Kumari, and T. Maity, “Development of MQTT Protocol-Based Sensor Data Subscription Using Raspberry-Pi as a Server Mode for IIoT Application,” 2024 IEEE International Conference on Smart Power Control and Renewable Energy (ICSPCRE), Rourkela, India, 19-21 July 2024, pp. 1–5. https://doi.org/10.1109/icspcre62303.2024.10675281
[16] E. Villar, I. M. Toral, I. Calvo, O. Barambones, and P. Fernández-Bustamante, “Architectures for Industrial AIoT Applications,” Sensors, vol. 24, no. 15, pp. 1–30, 2024. https://doi.org/10.3390/s24154929
[17] T. Zhukabayeva, L. Zholshiyeva, N. Karabayev, S. Khan, and N. Alnazzawi, “Cybersecurity Solutions for Industrial Internet of Things–Edge Computing Integration: Challenges, threats, and future directions,” Sensors, vol. 25, no. 1, pp. 1–42, 2025. https://doi.org/10.3390/s25010213
[18] T. Zvarivadza, M. Onifade, O. Dayo-Olupona, K. O. Said, J. M. Githiria, B. Genc, and T. Celik, “On the impact of Industrial Internet of Things (IIoT) - mining sector perspectives,” International Journal of Mining Reclamation and Environment, vol. 38, no. 10, pp. 771–809, 2024. https://doi.org/10.1080/17480930.2024.2347131
[19] L. S. Vailshery, “Number of internet of things (IoT) connections worldwide from 2022 to 2023, with forecasts from 2024 to 2033,” Statista. Retrieved February 12, 2025, from https://www.statista.com/aboutus/our-research-commitment/2816/lionel-sujay-vailshery (accessed March 8, 2025)
[20] A. Kaur, “Intrusion Detection Approach for Industrial Internet of Things Traffic using Deep Recurrent Reinforcement Learning Assisted Federated Learning,” IEEE Transactions on Artificial Intelligence, vol. 6, no. 1, pp. 1–13, 2025. https://doi.org/10.1109/tai.2024.3443787
[21] R. Sinha, P. Thakur, S. Gupta, and A. Shukla, “Development of lightweight intrusion model in Industrial Internet of Things using deep learning technique,” Discover Applied Sciences, vol. 6, no. 7, pp. 1–15, 2024. https://doi.org/10.1007/s42452-024-06044-4
[22] N. Alenezi, and A. Aljuhani, “Intelligent intrusion detection for industrial internet of things using clustering techniques,” Computer Systems Science and Engineering, vol. 46, no. 3, pp. 2899–2915, 2023. https://doi.org/10.32604/csse.2023.036657
[23] K. M. Alalayah, F. S. Alrayes, J. S. Alzahrani, K. M. Alaidarous, I. M. Alwayle, H. Mohsen, I. A. Ahmed, and M. A. Duhayyim, “Optimal deep learning based intruder identification in industrial internet of things environment,” Computer Systems Science and Engineering, vol. 46, no. 3, pp. 3121–3139, 2023. https://doi.org/10.32604/csse.2023.036352
[24] A. H. Eyeleko, and T. Feng, “A critical overview of industrial internet of things security and privacy issues using a Layer-Based Hacking scenario,” IEEE Internet of Things Journal, vol. 10, no. 24, pp. 21917–21941, 2023. https://doi.org/10.1109/jiot.2023.3308195
[25] A. Shahidinejad, and J. Abawajy, “Efficient provably secure authentication protocol for multidomain IIOT using a combined Off-Chain and On-Chain approach,” IEEE Internet of Things Journal, vol. 11, no. 9, pp. 15241–15251, 2024. https://doi.org/10.1109/jiot.2023.3347677
[26] M. N. Jamil, O. Schelén, A. A. Monrat, and K. Andersson, “Enabling industrial internet of things by leveraging distributed Edge-to-Cloud Computing: Challenges and opportunities,” IEEE Access, vol. 12, pp. 127294–127308, 2024. https://doi.org/10.1109/access.2024.3454812
[27] A. N. Alvi, B. Ali, M. S. Saleh, M. Alkhathami, D. Alsadie, and B. Alghamdi, “Secure computing for Fog-Enabled Industrial IoT,” Sensors, vol. 24, no. 7, pp. 1–21, 2024. https://doi.org/10.3390/s24072098
[28] P. Dini, L. Diana, A. Elhanashi, and S. Saponara, “Overview of AI-Models and Tools in embedded IIoT Applications,” Electronics, vol. 13, no. 12, pp. 1–33, 2024. https://doi.org/10.3390/electronics13122322
[29] A. Mehmood, A. Shafique, N. Kumar, and M. N. Bhutta, “Data security in the Industrial Internet of Things (IIoT) through a triple-image encryption framework leveraging 3-D NEAT, 1DCJ, and 4DHCFO techniques,” Computers & Electrical Engineering, vol. 118, pp. 1–27, 2024. https://doi.org/10.1016/j.compeleceng.2024.109354
[30] T. Rehman, N. Tariq, F. A. Khan, and S. U. Rehman, “FFL-IDS: a FOG-Enabled Federated Learning-Based Intrusion Detection System to counter jamming and spoofing attacks for the industrial internet of things,” Sensors, vol. 25, no. 1, pp. 1–34, 2024. https://doi.org/10.3390/s25010010
[31] V. Demertzi, S. Demertzis, and K. Demertzis, “An overview of privacy dimensions on the industrial Internet of things (IIoT),” Algorithms, vol. 16, no. 8, pp. 1–32, 2023. https://doi.org/10.3390/a16080378
[32] M. S. Farooq, M. Abdullah, S. Riaz, A. Alvi, F. Rustam, M. A. L. Flores, J. C. Galán, M. A. Samad, and I. Ashraf, “A survey on the Role of Industrial IoT in Manufacturing for Implementation of smart Industry,” Sensors, vol. 23, no. 21, pp. 1–38, 2023. https://doi.org/10.3390/s23218958
[33] A. K. Mishra, and M. Wazid, “Design of a cloud-based security mechanism for Industry 4.0 communication,” 2023 Third International Conference on Secure Cyber Computing and Communication (ICSCCC), Jalandhar, India, 26-28 May 2023, pp. 337–343. https://doi.org/10.1109/icsccc58608.2023.10176702
[34] O. Aouedi, T. Vu, A. Sacco, D. C. Nguyen, K. Piamrat, G. Marchetto, and Q. Pham, “A survey on intelligent Internet of Things: applications, security, privacy, and future directions,” IEEE Communications Surveys & Tutorials, pp. 1–56, 2024. https://doi.org/10.1109/comst.2024.3430368
[35] J. Cecílio, and A. Souto, “Security Issues in Industrial Internet-of-Things: Threats, Attacks and Solutions,” 2024 IEEE International Workshop on Metrology for Industry 4.0 & IoT (MetroInd4.0 & IoT), Firenze, Italy, 29-31 May 2024, pp. 458–463. https://doi.org/10.1109/metroind4.0iot61288.2024.10584217
[36] Y. Shan, Y. Yao, X. Zhou, T. Zhao, B. Hu, and L. Wang, “CFL-IDS: An effective clustered federated learning framework for industrial internet of things intrusion detection,” IEEE Internet of Things Journal, vol. 11, no. 6, pp. 10007–10019, 2024. https://doi.org/10.1109/jiot.2023.3324302
[37] B. Soudan, “ Cybersecurity of digital twins in industrial IoT environments,” 2024 Advances in Science and Engineering Technology International Conferences (ASET), Abu Dhabi, United Arab, 03-05 June 2024, pp. 1–6. https://doi.org/10.1109/aset60340.2024.10708640
[38] M. Adil, A. Farouk, H. Abulkasim, A. Ali, H. Song, and Z. Jin, “NG-ICPS: Next generation Industrial-CPS, Security Threats in the era of Artificial Intelligence, Open challenges with future research directions,” IEEE Internet of Things Journal, vol. 12, no. 2, pp. 1343–1367, 2025. https://doi.org/10.1109/jiot.2024.3486659
[39] P. R. Agbedanu, S. J. Yang, R. Musabe, I. Gatare, and J. Rwigema, “A scalable approach to internet of things and industrial internet of things security: Evaluating Adaptive Self-Adjusting Memory K-Nearest Neighbor for Zero-Day attack detection,” Sensors, vol. 25, no. 1, pp. 1–35, 2025. https://doi.org/10.3390/s25010216
[40] S. H. Mekala, Z. Baig, A. Anwar, and S. Zeadally, “Cybersecurity for Industrial IoT (IIoT): Threats, countermeasures, challenges and future directions,” Computer Communications, vol. 208, pp. 294–320, 2023. https://doi.org/10.1016/j.comcom.2023.06.020
[41] R. Ullah, A. Mehmood, M. A. Khan, C. Maple, and J. Lloret, “An optimal secure and reliable certificateless proxy signature for industrial internet of things,” Peer-to-Peer Networking and Applications, vol. 17, no. 4, pp. 2205–2220, 2024. https://doi.org/10.1007/s12083-024-01654-6
[42] M. Shahin, M. Maghanaki, A. Hosseinzadeh, and F. F. Chen, “Advancing Network Security in Industrial IoT: A Deep Dive into AI-Enabled Intrusion Detection Systems,” Advanced Engineering Informatics, vol. 62, pp. 102685, 2024. https://doi.org/10.1016/J.AEI.2024.102685
[43] X. Wang, W. Wang, C. Huang, P. Cao, Y. Zhu, and Q. Wu, “Blockchain-Based certificateless conditional anonymous authentication for IIoT,” IEEE Systems Journal, vol. 18, no. 1, pp. 656–667, 2024. https://doi.org/10.1109/jsyst.2023.3345370
[44] S. Yu, R. Zhai, Y. Shen, G. Wu, H. Zhang, S. Yu, and S. Shen, “Deep Q-Network-Based Open-Set intrusion detection solution for industrial internet of things,” IEEE Internet of Things Journal, vol. 11, no. 7, pp. 12536–12550, 2024. https://doi.org/10.1109/jiot.2023.3333903
[45] T. Le, Y. E. Oktian, and H. Kim, “XGBOOST for Imbalanced Multiclass Classification-Based Industrial Internet of Things Intrusion Detection Systems,” Sustainability, vol. 14, no. 14, pp. 1–21, 2022. https://doi.org/10.3390/su14148707
[46] Y. F. Liu, S. C. Li, X. H. Wang, and L. Xu, “A review of hybrid cyber threats modelling and detection using artificial intelligence in IIoT,” Computer Modeling in Engineering & Sciences, vol. 140, no. 2, pp. 1233-1261, 2024. https://doi.org/10.32604/cmes.2024.046473
[47] M. Schmitt, “Securing the digital world: Protecting smart infrastructures and digital industries with artificial intelligence (AI)-enabled malware and intrusion detection,” Journal of Industrial Information Integration, vol. 36, pp, 1–12, 2023. https://doi.org/10.1016/j.jii.2023.100520
[48] A. K. Tyagi, “Blockchain and artificial intelligence for cyber security in the era of internet of things and industrial internet of things applications,” In Advances in computational intelligence and robotics book series (pp. 171–199). IGI Global, 2023. https://doi.org/10.4018/979-8-3693-0659-8.ch007
[49] A. Yazdinejad, M. Kazemi, R. M. Parizi, A. Dehghantanha, and H. Karimipour, “An ensemble deep learning model for cyber threat hunting in industrial internet of things,” Digital Communications and Networks, vol. 9, no. 1, pp. 101–110, 2023. https://doi.org/10.1016/j.dcan.2022.09.008
[50] T. Hasan, J. Malik, I. Bibi, W. U. Khan, F. N. Al-Wesabi, K. Dev, and G. Huang, “Securing industrial internet of things against botnet attacks using hybrid deep learning approach,” IEEE Transactions on Network Science and Engineering, vol. 10, no. 5, pp. 2952–2963, 2023. https://doi.org/10.1109/tnse.2022.3168533
[51] I. Bibi, A. Akhunzada, and N. Kumar, “Deep AI-Powered cyber threat analysis in IIoT,” IEEE Internet of Things Journal, vol. 10, no. 9, pp. 7749–7760, 2023. https://doi.org/10.1109/jiot.2022.3229722
[52] M. Humayun, N. Tariq, M. Alfayad, M. Zakwan, G. Alwakid, and M. Assiri, “Securing the Internet of Things in Artificial Intelligence Era: A Comprehensive survey,” IEEE Access, vol. 12, pp. 25469–25490, 2024. https://doi.org/10.1109/access.2024.3365634
[53] B. Pimentel, and R. Pinto, “A Blockchain Approach Towards Secure Industrial Internet of Things Management,” 2023 IEEE 9th World Forum on Internet of Things (WF-IoT), Aveiro, Portugal, 12-27 October 2023, pp. 1–6. https://doi.org/10.1109/wf-iot58464.2023.10539412
[54] V. P. Patil, and S. Ohatkar, “Blockchain for IoT/Industrial IoT applications,” 2024 IEEE International Conference on Blockchain and Distributed Systems Security (ICBDS), Pune, India, 17-19 October 2024, pp. 1–7. https://doi.org/10.1109/icbds61829.2024.10837075
[55] M. Soori, F. K. G. Jough, R. Dastres, and B. Arezoo, “Blockchains for industrial Internet of Things in sustainable supply chain management of industry 4.0, a review,” Sustainable Manufacturing and Service Economics, vol. 3, pp. 1–18, 2024. https://doi.org/10.1016/j.smse.2024.100026
[56] P. Radanliev, “Artificial intelligence and quantum cryptography,” Journal of Analytical Science and Technology, vol. 15, no. 4, pp. 1–17, 2024. https://doi.org/10.1186/s40543-024-00416-6
[57] M. Wazid, A. K. Das, and Y. Park, “Generic Quantum Blockchain-Envisioned Security Framework for IoT Environment: Architecture, Security Benefits and Future Research,” IEEE Open Journal of the Computer Society, vol. 5, pp. 248–267, 2024. https://doi.org/10.1109/OJCS.2024.3397307
[58] S. Dhar, A. Khare, A. D. Dwivedi, and R. Singh, “Securing IoT devices: A novel approach using Blockchain and quantum cryptography,” Internet of Things, vol. 25, pp. 1–16, 2024. https://doi.org/10.1016/j.iot.2023.101019
[59] S. T. Whyte, “Quantum Cryptography and its Implications in Cybersecurity: Securing Communication in the Quantum Era,” American International Journal of Computer Science and Information Technology, vol. 9, no. 3, pp. 16–28, 2024. https://doi.org/10.5281/zenodo.13709957
[60] S. L. Nita, and M. I. Mihailescu, Cryptography and Cryptanalysis in Java: Creating and Programming Advanced Algorithms with Java SE 21 LTS and Jakarta EE 11 (2nd ed.). Berkeley, CA: Apress , 2024. https://doi.org/10.1007/979-8-8688-0441-0
[61] D. R. Ojha, “Quantum computing: Potential impacts on cryptography and data security,” Journal of Durgalaxmi, vol. 3, no. 1, pp. 87–106, 2024. https://doi.org/10.3126/jdl.v3i1.73848
[62] S. K. Sahu, and K. Mazumdar, “State-of-the-art analysis of quantum cryptography: applications and future prospects,” Frontiers in Physics, vol. 12, no. 1–13, 2024. https://doi.org/10.3389/fphy.2024.1456491
[63] C. G. Kinyua, “The Impact of Quantum Computing on Cryptographic Systems: Urgency of Quantum-Resistant Algorithms and Practical Applications in Cryptography,” European Journal of Information Technologies and Computer Science, vol. 5, no. 1, pp. 1–10, 2025. https://doi.org/10.24018/ejcompute.2025.5.1.146
[64] V. Rishiwal, U. Agarwal, M. Yadav, S. Tanwar, D. Garg, and M. Guizani, “A New Alliance of Machine Learning and Quantum Computing: Concepts, Attacks, and Challenges in IoT Networks,” IEEE Internet of Things Journal, 1–22, 2025. https://doi.org/10.1109/JIOT.2025.3535414
[65] M. Mahmood, and J. Abdul-Jabbar, “Securing Industrial Internet of Things (Industrial IoT)- A Reviewof Challenges and Solutions,” Al-Rafidain Engineering Journal (AREJ), vol. 28, no. 1, pp. 312–320, 2023. https://doi.org/10.33899/RENGJ.2022.135292.1196
[66] V. R., Kebande, and A. I. Awad, “Industrial Internet of Things Ecosystems Security and Digital Forensics: Achievements, Open Challenges, and Future Directions,” ACM Computing Surveys, vol. 56, no. 5, pp. 1–37, 2024. https://doi.org/10.1145/36350
[67] T. L. Narayana, C. Venkatesh, A. Kiran, C. B. J, A. Kumar, S. B. Khan, A. Almusharraf, and M. T. Quasim, “Advances in real time smart monitoring of environmental parameters using IoT and sensors,” Heliyon, vol. 10, no. 7, pp. e28195, 2024. https://doi.org/10.1016/J.HELIYON.2024.E28195
[68] S. F. Ahmed, M. S. B. Alam, M. Hoque, A. Lameesa, S. Afrin, T. Farah, M. Kabir, G. Shafiullah, and S. Muyeen, “Industrial Internet of Things enabled technologies, challenges, and future directions,” Computers & Electrical Engineering, vol. 110, pp. 1–16, 2023. https://doi.org/10.1016/j.compeleceng.2023.108847
[69] OpenAI. “ChatGPT [Large language model],” ChatGPT. https://chatgpt.com (accessed February 26, 2025)
[70] K. Li, Y. Zhang, Y. Huang, Z. Tian, and Z. Sang, “Framework and capability of industrial IoT infrastructure for smart Manufacturing,” Standards, vol. 3, no. 1, pp. 1–18, 2023. https://doi.org/10.3390/standards3010001
[71] H. Alshahrani, A. Khan, M. Rizwan, M. S. A. Reshan, A. Sulaiman, and A. Shaikh, “Intrusion Detection Framework for industrial internet of things using software defined network,” Sustainability, vol. 15, no. 11, pp. 1–18, 2023. https://doi.org/10.3390/su15119001
[72] G. Beniwal, and A. Singhrova, “A systematic literature review on IoT gateways,” Journal of King Saud University - Computer and Information Sciences, vol. 34, no. 10, pp. 9541–9563, 2022. https://doi.org/10.1016/J.JKSUCI.2021.11.007
[73] S. Mujawar, A. Deshpande, A. Gherkar, S. E. Simon, and B. Prajapati, “Introduction to Human-Machine Interface,” In M. Rishabha, S. Sonali, B. Prajapati, & S. K. Singh (Eds.), Human Machine Interface: Making Healthcare Digital (pp. 1–23). John Wiley & Sons, 2023. https://doi.org/10.1002/9781394200344.CH1
[74] M. Mowbray, M. Vallerio, C. Perez-Galvan, D. Zhang, A. Del Rio Chanona, and F. J. Navarro-Brull, “Industrial data science - a review of machine learning applications for chemical and process industries,” Reaction Chemistry and Engineering, vol. 7, no. 7, pp. 1471–1509, 2022. https://doi.org/10.1039/d1re00541c
[75] G. Czeczot, I. Rojek, D. Mikołajewski, and B. Sangho, “AI in IIoT Management of Cybersecurity for Industry 4.0 and Industry 5.0 Purposes,” Electronics, vol. 12, no. 18, pp. 1-15, 2023. https://doi.org/10.3390/electronics12183800
[76] S. Sujitha, K. S. Vinod, V. S. Dechamma, J. Likitha, R. M. Prajwal, and R. Jayanth, “Study of Interfacing PLC With HMI for Industrial Applications,” 2023 Second International Conference on Electronics and Renewable Systems (ICEARS), Tuticorin, India, 02-04 March 2023, pp. 343–346. https://doi.org/10.1109/icears56392.2023.10084927
[77] M. Alabadi, A. Habbal, and X. Wei, “Industrial Internet of Things: requirements, architecture, challenges, and future research directions,” IEEE Access, vol. 10, pp. 66374–66400, 2022. https://doi.org/10.1109/access.2022.3185049
[78] N. Hasan, and M. Alam, “Role of machine learning approach for industrial internet of things (IIoT) in cloud environment-a systematic review,” International Journal of Advanced Technology and Engineering Exploration, vol. 10, no. 108, pp. 1391–1416, 2023. https://doi.org/10.19101/ijatee.2023.10101133
[79] V. K. V. V. Bathalapalli, S. P. Mohanty, C. Pan, and E. Kougianos, “QPUF: Quantum Physical Unclonable Functions for Security-by-Design of Industrial Internet-of-Things,” 2023 IEEE International Symposium on Smart Electronic Systems (iSES), Ahmedabad, India, 18-20 December 2023, pp. 296–301. https://doi.org/10.1109/ises58672.2023.00067
[80] G. Gokilakrishnan, V. M, A. Dhanamurugan, A. Bhasha, R. Subbiah, and A. H, “A review of applications, enabling technologies, growth challenges and solutions for IoT/IIoT,” 2023 9th International Conference on Advanced Computing and Communication Systems (ICACCS). Coimbatore, India, 17-18 March 2023, pp. 2241-2250. https://doi.org/10.1109/icaccs57279.2023.10112825
[81] B. Alotaibi, “A survey on industrial Internet of Things Security: requirements, attacks, AI-Based solutions, and edge computing opportunities,” Sensors, vol. 23, no. 17, pp. 1–49, 2023. https://doi.org/10.3390/s23177470
[82] Z. Xing, Y. Lan, Z. Sun, X. Yang, H. Zheng, Y. Yu, and D. Yu, “IoT OS Platform: Software infrastructure for Next-Gen industrial IoT,” Applied Sciences, vol. 14, no. 13, pp. 1–25, 2024. https://doi.org/10.3390/app14135370
[83] M. Wang, Y. Sun, H. Sun, and B. Zhang, “Security Issues on Industrial Internet of Things: Overview and challenges,” Computers, vol. 12, no. 12, pp. 1–27, 2023. https://doi.org/10.3390/computers12120256
[84] I. T. Christou, N. Kefalakis, J. K. Soldatos, and A. M. Despotopoulou, “End-to-end industrial IoT platform for Quality 4.0 applications,” Computers in Industry, vol. 137, pp. 103591, 2022. https://doi.org/10.1016/J.COMPIND.2021.103591
[85] K. Zhang, C. K. M. Lee, and Y. P. Tsang, “Stateless Blockchain-Based lightweight identity management architecture for industrial IoT applications,” IEEE Transactions on Industrial Informatics, vol. 20, no. 6, pp. 8394–8405, 2024. https://doi.org/10.1109/tii.2024.3367364
[86] J. Kim, J. Park, and J. H. Lee, “Analysis of Recent IIoT Security Technology Trends in a Smart Factory Environment,” 2023 International Conference on Artificial Intelligence in Information and Communication (ICAIIC), Bali, Indonesia, 20-23 February 2023, pp. 840–845. https://doi.org/10.1109/ICAIIC57133.2023.10067004
[87] M. Soori, B. Arezoo, and R. Dastres, “Internet of things for smart factories in industry 4.0, a review,” Internet of Things and Cyber-Physical Systems, vol. 3, pp. 192–204, 2023. https://doi.org/10.1016/J.IOTCPS.2023.04.006
[88] F. Hadi Masmali, S. J. Miah, and N. Noman, “Different Applications and Technologies of Internet of Things (IoT),” In Lecture Notes in Networks and Systems (Vol. 464). Springer Nature, 2023. https://doi.org/10.1007/978-981-19-2394-4_5
[89] R. D. S. G. Campilho, and F. J. G. Silva, “Industrial Process Improvement by Automation and Robotics,” Machines, vol. 11, no. 11, pp. 1-5, 2023. https://doi.org/10.3390/MACHINES11111011
[90] P. Kantanavar, and S. Rajendran, “Industrial Internet of Things: Architecture and Its Applications,” In Internet of Things (1st ed., pp. 1–20). Taylor & Francis, 2023. https://www.taylorfrancis.com/chapters/edit/10.1201/9781003226888-18/industrial-internet-things-architecture-applications-pratibha-kantanavar-sindhu-rajendran
[91] G. Karacayılmaz, and H. Artuner, “A novel approach detection for IIoT attacks via artificial intelligence,” Cluster Computing, vol. 27, no. 8, pp. 10467–10485, 2024. https://doi.org/10.1007/S10586-024-04529-W/TABLES/1
[92] H. V. Krishna, and K. R. Sekhar, “Enhancing security in IIoT applications through efficient quantum key exchange and advanced encryption standard,” Soft Computing, vol. 28, no. 3, pp. 2671–2681, 2024. https://doi.org/10.1007/s00500-023-09585-9
[93] A., Presciuttini, and A. Portioli-Staudacher, “Applications of IoT and Advanced Analytics for manufacturing operations: a systematic literature review,” Procedia Computer Science, vol. 232, pp. 327–336, 2024. https://doi.org/10.1016/J.PROCS.2024.01.032
[94] S. Li, S. Zhao, G. Min, L. Qi, and G. Liu, “Lightweight Privacy-Preserving scheme using homomorphic encryption in industrial internet of things,” IEEE Internet of Things Journal, vol. 9, no. 16, pp. 14542–14550, 2022. https://doi.org/10.1109/jiot.2021.3066427
[95] A. Alnajim, S. Habib, M. Islam, S. Thwin, and F. Alotaibi, “A comprehensive survey of cybersecurity threats, attacks, and effective countermeasures in industrial internet of things,” Technologies, vol. 11, no. 6, pp. 1–26, 2023. https://doi.org/10.3390/technologies11060161
[96] S. Soliman, W. Oudah, and A. Aljuhani, “Deep learning-based intrusion detection approach for securing industrial Internet of Things,” Alexandria Engineering Journal, vol. 81, pp. 371–383, 2023. https://doi.org/10.1016/j.aej.2023.09.023
[97] K. Jayasudha, and T. N. Anitha, “Unraveling the impact of social engineering on organizations,” In Social Engineering in Cybersecurity: Threats and Defenses (pp. 70–84). Taylor & Francis, 2024. https://doi.org/10.1201/9781003406716-5
[98] V. Bharath, H. L. Gururaj, B. C. Soundarya, and L. Girish, “Introduction to social engineering,” In Social Engineering in Cybersecurity: Threats and Defenses (pp. 1–25). Taylor & Francis, 2024. https://doi.org/10.1201/9781003406716-1
[99] H. Alasmary, “RDAF-IIOT: Reliable Device-Access Framework for the Industrial Internet of Things,” Mathematics, vol. 11, no. 12, pp. 1–21, 2023. https://doi.org/10.3390/math11122710
[100] C. Gan, J. Lin, D. Huang, Q. Zhu, and L. Tian, “Advanced Persistent Threats and their defense Methods in Industrial Internet of Things: a survey,” Mathematics, vol. 11, no. 14, pp. 1–23, 2023. https://doi.org/10.3390/math11143115
[101] A. Saxena, and S. Mittal, “Advanced Persistent Threat Datasets for Industrial IoT : A Survey,” 2023 Second International Conference on Informatics (ICI), Noida, India, 23-25 November 2023, pp. 1–6. https://doi.org/10.1109/ici60088.2023.10421181
[102] N. K. Pandey, K. Kumar, G. Saini, and A. K. Mishra, “Security issues and challenges in cloud of things-based applications for industrial automation,” Annals of Operations Research, vol. 342, no. 1, pp. 565–584, 2023. https://doi.org/10.1007/s10479-023-05285-7
[103] M. M. Khan, A. Buriro, T. Ahmad, and S. Ullah, “Backdoor malware detection in industrial IoT using machine learning,” Computers, Materials & Continua, vol. 81, no. 3, pp. 1–10, 2024. https://doi.org/10.32604/cmc.2024.057648
[104] N. Subramanian, S. N. Bushra, G. Shobana, and S. Radhika, “Backdoor Attacks Prediction in IIoT Network using Optimal Double Mask Region Convolution Model,” IETE Journal of Research, vol. 70, no. 5, pp. 4801–4814, 2024. https://doi.org/10.1080/03772063.2023.2230174
[105] G. Ali, M. M. Mijwil, B. A. Buruga, M. Abotaleb, and I. Adamopoulos, “A Survey on Artificial Intelligence in Cybersecurity for Smart Agriculture: State-of-the-Art, Cyber Threats, Artificial Intelligence Applications, and Ethical Concerns,” Mesopotamian Journal of Computer Science, vol. 2024, pp. 71–121, 2024. https://doi.org/10.58496/MJCSC/2024/007
[106] G. Ali, M. M. Mijwil, B. A. Buruga, and M. Abotaleb, “A Comprehensive Review on Cybersecurity Issues and Their Mitigation Measures in FinTech,” Iraqi Journal For Computer Science and Mathematics, vol. 5, no. 3, pp. 45–91, 2024. doi:https://doi.org/10.52866/ijcsm.2024.05.03.004
[107] V. Bali, “Industrial Cybersecurity Market Report 2025 (Global Edition),” In Cognitive Market Research (No. CMR648420). Cognitive Market Research, 2024. Accessed: Feb. 21, 2025. [Online]. Available: https://www.cognitivemarketresearch.com/industrial-cybersecurity-market-report?srsltid=AfmBOooZFNN_H2NAyXEmkyS2sEQNEFfYDKY6watfFfMPhPbZ0y3Jz-OO
[108] G. Ali, and M. M. Mijwil, “Cybersecurity for Sustainable Smart Healthcare: State of the Art, Taxonomy, Mechanisms, and Essential Roles,” Mesopotamian Journal of CyberSecurity, vol. 4, no. 2, pp. 20–62, 2024. https://doi.org/10.58496/MJCS/2024/006
[109] G. Bravos, A. J. Cabrera, C. Correa, D. Danilovic, N. Evangeliou, G. Ezov, Z. Gajica, D. Jakovetic, L. Kallipolitis, M. Lukic, J. Mascolo, D. Masera, R. Mazo, I. Mezei, A. Miaoudakis, N. Milosevic, W. Oliff, J. Robin, M. Smyrlis, . . . D. Vukobratovic, “Cybersecurity for Industrial Internet of Things: architecture, models and lessons learned,” IEEE Access, vol. 10, pp. 124747–124765, 2022. https://doi.org/10.1109/access.2022.3225074
[110] G. Ali, R. Wamusi, M. M. Mijwil, M. Sallam, J. Ayad, and I. Adamopoulos, “Securing the Internet of Wetland Things (IoWT) Using Machine and Deep Learning Methods: A Survey,” Mesopotamian Journal of Computer Science, vol. 2025, pp. 17–63, 2025. https://doi.org/10.58496/mjcsc
[111] G. Ali, M. M. Mijwil, I. Adamopoulos, and J. Ayad, “Leveraging the Internet of Things, Remote Sensing, and Artificial Intelligence for Sustainable Forest Management,” Babylonian Journal of Internet of Things, vol. 2025, pp. 1–65, 2025. https://doi.org/10.58496/BJIoT/2025/001
[112] M. M. Mijwil, O. Adelaja, A. Badr, G. Ali, B. A. Buruga, and P. Pudasaini, “Innovative Livestock: A Survey of Artificial Intelligence Techniques in Livestock Farming Management,” Wasit Journal of Computer and Mathematics Science, vol. 2, no. 4, pp. 99–106, 2023. https://doi.org/10.31185/wjcms.206
[113] G. Ali, and W. Robert, “Machine Learning for Temperature Analysis in Ouagadougou: A Random Forest Perspective,” EDRAAK, vol. 2024, pp. 101-105, 2024. https://doi.org/10.70470/EDRAAK/2024/012
[114] G. Ali, M. M. Mijwil, I. Adamopoulos, B. A. Buruga, M. Gök, and M. Sallam, “Harnessing the Potential of Artificial Intelligence in Managing Viral Hepatitis,” Mesopotamian Journal of Big Data, vol. 2024, pp. 128–163, 2024. https://doi.org/10.58496/MJBD/2024/010
[115] K., Wu, and J. Chen, “Implementing Robust Security Measures in Cloud Infrastructure: Strategies, Best Practices, and Emerging Trends,” Engineering Advances, vol. 3, no. 4, pp. 337–341, 2023. https://doi.org/10.26855/EA.2023.08.012
[116] S. Chaudhary, and P. K. Mishra, “DDoS attacks in Industrial IoT: A survey,” Computer Networks, vol. v236, pp. 110015, 2023. https://doi.org/10.1016/J.COMNET.2023.110015
[117] J. Ayad, G. Ali, W. Ullah, and W. Robert, “Encryption of Color Images utilizing cascading 3D Chaotic Maps with S-Box Algorithms,” SHIFRA, vol. 2023, pp. 95-107, 2023. https://doi.org/10.70470/SHIFRA/2023/011
[118] N. Mishra, S. K. Hafizul Islam, and S. Zeadally, “A survey on security and cryptographic perspective of Industrial-Internet-of-Things,” Internet of Things, vol. 25, pp. 101037, 2024. https://doi.org/10.1016/j.iot.2023.101037
[119] M. M. Mijwil, M. Abotaleb, G. Ali, and K. Dhoska, “Assigning Medical Professionals: ChatGPT’s Contributions to Medical Education and Health Prediction,” Mesopotamian Journal of Artificial Intelligence in Healthcare, vol. 2024, pp. 76–83, 2024. https://doi.org/10.58496/MJAIH/2024/011
[120] A.-H. Al-Mistarehi, M. M. Mijwil, Y. Filali, M. Bounabi, G. Ali, and M. Abotaleb, “Artificial Intelligence Solutions for Health 4.0: Overcoming Challenges and Surveying Applications,” Mesopotamian Journal of Artificial Intelligence in Healthcare, vol. 2023, pp. 15–20, 2023. https://doi.org/10.58496/mjaih/2023/003
[121] M. Paramesha, N. L. Rane, and J. Rane, “Artificial Intelligence, Machine Learning, and Deep Learning for Cybersecurity Solutions: A review of Emerging Technologies and applications,” Partners Universal Multidisciplinary Research Journal (PUMRJ), vol. 1, no. 2, pp. 84–109, 2024. https://doi.org/10.5281/zenodo.12827076
[122] J. Ali, S. K. Singh, W. Jiang, A. M. Alenezi, M. Islam, Y. I. Daradkeh, and A. Mehmood, “A deep dive into cybersecurity solutions for AI-driven IoT-enabled smart cities in advanced communication networks,” Computer Communications, vol. 229, pp. 1–27, 2025. https://doi.org/10.1016/j.comcom.2024.108000
[123] L. Idouglid, S. Tkatek, K. Elfayq, and A. Guezzaz, “Next-gen security in IIoT: integrating intrusion detection systems with machine learning for industry 4.0 resilience,” International Journal of Power Electronics and Drive Systems/International Journal of Electrical and Computer Engineering, vol. 14, no. 3, pp. 3512–3521, 2024. https://doi.org/10.11591/ijece.v14i3.pp3512-3521
[124] G. Zeng, Y. Yang, K. Lu, G. Geng, and J. Weng, “Evolutionary adversarial autoencoder for unsupervised anomaly detection of industrial internet of things,” IEEE Transactions on Reliability, pp. 1–15, 2025. https://doi.org/10.1109/tr.2025.3528256
[125] N. Alkhafaji, T. Viana, and A. Al-Sherbaz, “Integrated genetic algorithm and deep learning approach for effective Cyber-Attack detection and classification in industrial Internet of things (IIoT) environments,” Arabian Journal for Science and Engineering, pp. 1–25, 2024. https://doi.org/10.1007/s13369-024-09663-6
[126] M. Ozkan-Okay, E. Akin, Ö. Aslan, S. Kosunalp, T. Iliev, I. Stoyanov, and I. Beloev, “A comprehensive survey: Evaluating the efficiency of artificial intelligence and machine learning techniques on cyber security solutions,” IEEE Access, vol. 12, pp. 12229–12256, 2024. https://doi.org/10.1109/access.2024.3355547
[127] A. K. Abed, and A. Anupam, “Review of security issues in Internet of Things and artificial intelligence‐driven solutions,” Security and Privacy, vol. 6, no. 3, pp. 1–18, 2022. https://doi.org/10.1002/spy2.285
[128] N. M. Maddu, “Integrated Intrusion Detection and Mitigation Framework for SDN-Based IIOT networks using lightweight and adaptive AI techniques,” Journal of Information Systems Engineering & Management, vol. 10, no. 9s, pp. 456–472, 2025. https://doi.org/10.52783/jisem.v10i9s.1244
[129] O. F. Awad, L. R. Hazim, A. A. Jasim, and O. Ata, “Enhancing IIoT Security with Machine Learning and Deep Learning for Intrusion Detection,” Malaysian Journal of Computer Science, vol. 37, no. 2, pp. 139–153, 2024. https://doi.org/10.22452/mjcs.vol37no2.3
[130] K. Yang, J. Wang, and M. Li, “An improved intrusion detection method for IIoT using attention mechanisms, BiGRU, and Inception-CNN,” Scientific Reports, vol. 14, no. 1, pp. 1–24, 2024. https://doi.org/10.1038/s41598-024-70094-2
[131] J. A. B. Angelin, and C. Priyadharsini, “Deep Learning based Network based Intrusion Detection System in Industrial Internet of Things,” 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT), Bengaluru, India, 04-06 January 2024, pp. 426–432. https://doi.org/10.1109/idciot59759.2024.10467510
[132] N. Yalçın, S. Çakır, and S. Ünaldı, “Attack detection using artificial intelligence methods for SCADA security,” IEEE Internet of Things Journal, vol. 11, no. 24, pp. 39550–39559, 2024. https://doi.org/10.1109/jiot.2024.3447876
[133] D. Attique, W. Hao, W. Ping, D. Javeed, and P. Kumar, “Explainable and Data-Efficient deep learning for enhanced attack detection in IIoT ecosystem,” IEEE Internet of Things Journal, vol. 11, no. 24, pp. 38976–38986, 2024. https://doi.org/10.1109/jiot.2024.3384374
[134] E. V. N. Jyothi, M. Kranthi, S. Sailaja, U. Sesadri, S. N. Koka, and P. C. S. Reddy, “An Adaptive Intrusion Detection System in Industrial Internet of Things(IIoT) using Deep Learning,” 2024 1st International Conference on Innovative Sustainable Technologies for Energy, Mechatronics, and Smart Systems (ISTEMS), Dehradun, India, 26-27 April 2024, pp. 1–6. https://doi.org/10.1109/istems60181.2024.10560245
[135] D. Jagli, R. Temkar, L. Nakirekanti, and A. Bhatt, “The role of artificial intelligence in cyber security,” Journal of Electrical Systems, vol. 20, no. 3, pp. 5283–5291, 2024. https://doi.org/10.52783/jes.6327
[136] G. F. Asere, K. A. Nuga, and M. Medugu, “The role of Artificial intelligence in Cybersecurity: Understanding the dynamics, impacts, and remediations,” Journal of Computer, Software and Program, vol. 2, no. 1, pp. 1–9, 2025. https://doi.org/10.69739/jcsp.v2i1.120
[137] N. A. Folorunso, N. T. Adewumi, N. A. Adewa, N. R. Okonkwo, and N. T. N. Olawumi, “Impact of AI on cybersecurity and security compliance,” Global Journal of Engineering and Technology Advances, vol. 21, no. 1, pp. 167–184, 2024. https://doi.org/10.30574/gjeta.2024.21.1.0193
[138] L. Ofusori, T. Bokaba, and S. Mhlongo, “Artificial intelligence in cybersecurity: a comprehensive review and future direction,” Applied Artificial Intelligence, vol. 38, no. 1, pp. 1–47, 2024. https://doi.org/10.1080/08839514.2024.2439609
[139] F. K. Karim, J. Varela-Aldás, M. K. Ishak, A. Aljarbouh, and S. M. Mostafa, “Modeling of Bayesian machine learning with sparrow search algorithm for cyberattack detection in IIoT environment,” Scientific Reports, vol. 14, no. 1, pp. 1–26, 2024. https://doi.org/10.1038/s41598-024-79632-4
[140] Z. Chen, Z. Li, J. Huang, S. Liu, and H. Long, “An effective method for anomaly detection in industrial Internet of Things using XGBoost and LSTM,” Scientific Reports, vol. 14, no. 1, pp. 1–23, 2024. https://doi.org/10.1038/s41598-024-74822-6
[141] M. Miryahyaei, M. Fartash, and J. A. Torkestani, “Focal Causal Temporal Convolutional Neural Networks: Advancing IIoT Security with Efficient Detection of Rare Cyber-Attacks,” Sensors, vol. 24, no. 19, pp. 1–26, 2024. https://doi.org/10.3390/s24196335
[142] S. Kim, W. Jo, H. Kim, S. Choi, D. Jung, H. Choi, and T. Shon, “Two-Phase industrial control system anomaly detection using communication patterns and deep learning,” Electronics, vol. 13, no. 8, pp. 1–17, 2024. https://doi.org/10.3390/electronics13081520
[143] M. Arsalan, M. Mubeen, M. Bilal, and S. F. Abbasi, “1D-CNN-IDS: 1D CNN-based intrusion Detection system for IIOT,” 2024 29th International Conference on Automation and Computing (ICAC), Sunderland, United Kingdom, 28-30 August 2024, pp. 1–4. https://doi.org/10.1109/icac61394.2024.10718772
[144] T. N. Alrumaih, and M. J. Alenazi, “ERINDA: A novel framework for Enhancing the Resilience of Industrial Networks against DDoS Attacks with adaptive recovery,” Alexandria Engineering Journal, vol. 121, pp. 248–262, 2025. https://doi.org/10.1016/j.aej.2025.02.042
[145] M. Mudassir, D. Unal, M. Hammoudeh, and F. Azzedin, “Detection of Botnet Attacks against Industrial IoT Systems by Multilayer Deep Learning Approaches,” Wireless Communications and Mobile Computing, vol. 2022, pp. 1–12, 2022. https://doi.org/10.1155/2022/2845446
[146] H. Cha, H. Yang, Y. Song, and A. R. Kang, “Intelligent Anomaly Detection System through Malware Image Augmentation in IIoT Environment Based on Digital Twin,” Applied Sciences, vol. 13, no. 18, pp. 1–21, 2023. https://doi.org/10.3390/app131810196
[147] I. Ahmed, M. Anisetti, A. Ahmad, and G. Jeon, “A multilayer deep learning approach for malware classification in 5G-Enabled IIoT,” IEEE Transactions on Industrial Informatics, vol. 19, no. 2, pp. 1495–1503, 2023. https://doi.org/10.1109/tii.2022.3205366
[148] S. H. Javed, M. B. Ahmad, M. Asif, S. H. Almotiri, K. Masood, and M. A. A. Ghamdi, “An intelligent system to detect advanced persistent threats in industrial internet of things (I-IoT),” Electronics, vol. 11, no. 5, pp. 1–25, 2022. https://doi.org/10.3390/electronics11050742
[149] W. Miao, X. Zhao, Y. Zhang, S. Chen, X. Li, and Q. Li, “A Deep Learning-Based method for preventing data leakage in electric power industrial internet of things business data interactions,” Sensors, vol. 24, no. 13, pp. 1–20, 2024. https://doi.org/10.3390/s24134069
[150] D. Kiseki, V. Havyarimana, D. Zabagunda, W. Wail, and T. Niyonsaba, “Artificial Intelligence in Cybersecurity to Detect Phishing,” Journal of Computer and Communications, vol. 12, pp. 91-115, 2024. doi: 10.4236/jcc.2024.1212007.
[151] O. A. Lamina, W. A. Ayuba, O. E. Adebiyi, G. E. Michael, O. D. Samuel, and K. O. Samuel, “AI-Powered Phishing Detection and Prevention,” Path of Science, vol. 10, no. 12, pp. 4001–4010, 2024. https://doi.org/10.22178/pos.112-7
[152] M. A. Tamal, M. K. Islam, T. Bhuiyan, A. Sattar, and N. U. Prince, “Unveiling suspicious phishing attacks: enhancing detection with an optimal feature vectorization algorithm and supervised machine learning,” Frontiers in Computer Science, vol. 6, pp. 1–19, 2024. https://doi.org/10.3389/fcomp.2024.1428013
[153] D. O. Ofoegbu, K. S. Osundare, O. S. Ike, C. G. Fakeyede, O. B. Ige, and C. Author, “Data-Driven Cyber Threat Intelligence: Leveraging Behavioral Analytics for Proactive Defense Mechanisms,” Computer Science & IT Research Journal, vol. 4, no. 3, pp. 502–524, 2023. https://doi.org/10.51594/CSITRJ.V4I3.1501
[154] J. Uzoma, O. Falana, C. Obunadike, and E. S. Obunadike. “Using Artificial Intelligence for Automated Incidence Response in Cybersecurity,” International Journal of Information Technology (IJIT), vol. 1, no. 4, pp. 1-32, 2023.
[155] D. Garabato, C. Dafonte, R. Santoveña, A. Silvelo, F. J. Nóvoa, and M. Manteiga, “AI-based user authentication reinforcement by continuous extraction of behavioral interaction features,” Neural Computing and Applications, vol. 34, no. 14, pp. 11691–11705, 2022. https://doi.org/10.1007/S00521-022-07061-3/TABLES/6
[156] S. Selvarajan, G. Srivastava, A. O. Khadidos, A. O. Khadidos, M. Baza, A. Alshehri, and J. C. Lin, “An artificial intelligence lightweight Blockchain security model for security and privacy in IIoT systems,” Journal of Cloud Computing Advances Systems and Applications, vol. 12, no. 1, pp. 1–17, 2023. https://doi.org/10.1186/s13677-023-00412-y
[157] H. Tian, and G. Huang, “Research on Distributed secure storage framework of industrial internet of things data based on Blockchain,” Electronics, vol. 13, no. 23, pp. 1–20, 2024. https://doi.org/10.3390/electronics13234812
[158] K. S. Kumar, J. A. Alzubi, N. Sarhan, E. M. Awwad, V. Kandasamy, and G. Ali, “A secure and efficient Blockchain and distributed Ledger technology-based optimal resource management in digital twin beyond 5G networks using hybrid energy valley and levy Flight Distributer Optimization algorithm,” IEEE Access, vol. 12, pp. 110331–110352, 2024. https://doi.org/10.1109/access.2024.3435847
[159] S. B. Kahyaoglu, and V. Tecim, “Exploring Blockchain Applications: Management Perspectives,” In CRC Press eBooks (1st ed.). CRC Press, 2024. https://doi.org/10.1201/9781003389552
[160] D. Dutta, and P. Govindaraj, “Exploring Blockchain: technological foundations, applications, and security concerns,” Engineering Research Express, vol. 7, pp. 1–15, 2025. https://doi.org/10.1088/2631-8695/ada2de
[161] A. Denis, A. Thomas, W. Robert, A. Samuel, S. P. Kabiito, Z. Morish, M. Sallam, G. Ali, and M. M. Mijwil, “A Survey on Artificial Intelligence and Blockchain Applications in Cybersecurity for Smart Cities,” SHIFRA, vol. 2025, pp. 1-45, 2025. https://doi.org/10.70470/SHIFRA/2025/001
[162] D. Mourtzis, J. Angelopoulos, and N. Panopoulos, “Blockchain integration in the era of industrial metaverse,” Applied Sciences, vol. 13, no. 3, pp. 1–29, 2023. https://doi.org/10.3390/app13031353
[163] L. A. C. Ahakonye, C. I. Nwakanma, and D. Kim, “Tides of Blockchain in IoT Cybersecurity,” Sensors, vol. 24, no. 10, pp. 1–27, 2024. https://doi.org/10.3390/s24103111
[164] S. Latif, Z. Idrees, Z. E. Huma, and J. Ahmad, “Blockchain technology for the industrial Internet of Things: A comprehensive survey on security challenges, architectures, applications, and future research directions,” Transactions on Emerging Telecommunications Technologies, vol. 32, no. 11, pp. 1–37, 2021. https://doi.org/10.1002/ett.4337
[165] F. Wang, J. Cui, Q. Zhang, D. He, and H. Zhong, “Blockchain-Assisted flexible revocable anonymous authentication in industrial internet of things,” IEEE Transactions on Network Science and Engineering, pp. 1–16, 2025. https://doi.org/10.1109/tnse.2024.3503996
[166] S. K. Dwivedi, P. Roy, C. Karda, S. Agrawal, and R. Amin, “Blockchain-Based Internet of Things and Industrial IoT: A Comprehensive survey,” Security and Communication Networks, vol. 2021, pp. 1–21, 2021. https://doi.org/10.1155/2021/7142048
[167] W. Robert, A. Denis, A. Thomas, A. Samuel, S. P. Kabiito, Z. Morish, and G. Ali, “A Comprehensive Review on Cryptographic Techniques for Securing Internet of Medical Things: A State-of-the-Art, Applications, Security Attacks, Mitigation Measures, and Future Research Direction,” Mesopotamian Journal of Artificial Intelligence in Healthcare, vol. 2024, pp. 135–169, 2024. https://doi.org/10.58496/MJAIH/2024/016
[168] W. Tong, L. Yang, Z. Li, X. Jin, and L. Tan, “Enhancing security and flexibility in the industrial internet of things: Blockchain-Based data sharing and privacy protection,” Sensors, vol. 24, no. 3, pp. 1–27, 2024. https://doi.org/10.3390/s24031035
[169] M. S. Dildar, A. S. Khan, I. A. Abbasi, R. Shaheen, K. A. Ruqaishi, and S. Ahmed, “End-to-end security mechanism using Blockchain for Industrial Internet of Things,” IEEE Access, vol. 13, pp. 20584–20598, 2025. https://doi.org/10.1109/access.2025.3535821
[170] F. Wang, J. Cui, Q. Zhang, D. He, C. Gu, and H. Zhong, “Blockchain-Based lightweight message authentication for Edge-Assisted Cross-Domain industrial internet of things,” IEEE Transactions on Dependable and Secure Computing, vol. 21, no. 4, pp. 1587–1604, 2024. https://doi.org/10.1109/tdsc.2023.3285800
[171] F. Wang, J. Cui, Q. Zhang, D. He, and H. Zhong, “Blockchain-Based secure Cross-Domain data sharing for Edge-Assisted industrial internet of things,” IEEE Transactions on Information Forensics and Security, vol. 19, pp. 3892–3905, 2024. https://doi.org/10.1109/tifs.2024.3372806
[172] A. Aljuhani, P. Kumar, R. Alanazi, T. Albalawi, O. Taouali, A. K. M. N. Islam, N. Kumar, and M. Alazab, “A Deep-Learning-Integrated Blockchain framework for securing industrial IoT,” IEEE Internet of Things Journal, vol. 11, no. 5, pp. 7817–7827, 2023. https://doi.org/10.1109/jiot.2023.3316669
[173] M. N. Sohail, A. Anjum, I. A. Saeed, M. H. Syed, A. Jantsch, and S. Rehman, “Optimizing industrial IoT data security through Blockchain-Enabled Incentive-Driven Game theoretic approach for data sharing,” IEEE Access, vol. 12, pp. 51176–51192, 2024. https://doi.org/10.1109/access.2024.3382571
[174] Y. Chen, X. Lin, H. Xu, S. Liao, J. Guo, and C. Zou, “Leveraging Blockchain and Coded Computing for Secure Edge Collaborate Learning in Industrial IoT,” 2024 33rd International Conference on Computer Communications and Networks (ICCCN), Kailua-Kona, HI, USA, 29-31 July 2024, pp. 1–6. https://doi.org/10.1109/icccn61486.2024.10637571
[175] Z. Cao, X. Wen, S. Ai, W. Shang, and S. Huan, “A decentralized authentication scheme for smart factory based on Blockchain,” Scientific Reports, vol. 14, no. 1, pp. 1–12, 2024. https://doi.org/10.1038/s41598-024-76065-x
[176] P. Yao, B. Yan, T. Yang, Y. Wang, Q. Yang, and W. Wang, “Security-Enhanced Operational Architecture for decentralized industrial Internet of Things: a Blockchain-Based approach,” IEEE Internet of Things Journal, vol. 11, no. 6, pp. 11073–11086, 2024. https://doi.org/10.1109/jiot.2023.3329352
[177] A. Zainudin, M. A. P. Putra, R. N. Alief, D. Kim, and J. Lee, “Blockchain-aided collaborative threat detection for securing digital twin-based IIoT networks,” ICC 2024 - IEEE International Conference on Communications, Denver, CO, USA, 09-13 June 2024, pp. 4656–4661. https://doi.org/10.1109/icc51166.2024.10622717
[178] Z. Mammeri, Cryptography: Algorithms, Protocols, and Standards for Computer Security (1st ed.). John Wiley & Sons, Inc, 2024.
[179] H. Yin, Y. Li, H. Deng, W. Zhang, Z. Qin, and K. Li, “An Attribute-Based keyword search scheme for multiple data owners in Cloud-Assisted industrial internet of things,” IEEE Transactions on Industrial Informatics, vol. 19, no. 4, pp. 5763–5773, 2023. https://doi.org/10.1109/tii.2022.3192304
[180] M. Alawida, “A novel image encryption algorithm based on cyclic chaotic map in industrial IoT environments,” IEEE Transactions on Industrial Informatics, vol. 20, no. 8, pp. 10530–10541, 2024. https://doi.org/10.1109/tii.2024.3395631
[181] Z. A. Shaikh, F. Hajjej, Y. D. Uslu, S. Yüksel, H. Dınçer, R. Alroobaea, A. M. Baqasah, and U. Chinta, “A New Trend in Cryptographic Information Security for Industry 5.0: A Systematic review,” IEEE Access, vol. 12, pp. 7156–7169, 2024. https://doi.org/10.1109/access.2024.3351485
[182] V. A. Telsang, M. S. Kakkasageri, and A. D. Devangavi, “Edge Computing Devices Authentication using Quantum Computing,” 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India, 24-28 June 2024, pp. 1–6. https://doi.org/10.1109/ICCCNT61001.2024.10725671
[183] S. Chaitrasree, and G. A. Srinidhi, “Quantum Cryptography for Enhanced Cyber Security – A Review,” International Journal of Enhanced Research in Science, Technology & Engineering, vol. 13, no. 10, pp. 1–20, 2024.
[184] M. Hasan, “Quantum Cryptography for Secure Communications and the Enhancement of U.S. Cybersecurity in the Quantum Age,” Advances in Social Sciences Research Journal, vol. 11, no. 10, pp. 1–9, 2024. https://doi.org/10.14738/assrj.1110.17764.
[185] B. Senapati, and B. S. Rawal, “Quantum communication with RLP quantum resistant cryptography in industrial manufacturing,” Cyber Security and Applications, vol. 1, pp. 1–8, 2023. https://doi.org/10.1016/j.csa.2023.100019
[186] A. Green, J. Lawrence, G. Siopsis, N.A. Peters, and A. Passian, “Quantum Key Distribution for Critical Infrastructures: Towards Cyber-Physical Security for Hydropower and Dams,” Sensors, vol. 23, no. 24, pp. 1-24, 2023. https://doi.org/10.3390/s23249818
[187] S. Sonko, K. I. Ibekwe, V. I. Ilojianya, E. A. Etukudoh, and A. Fabuyide, “Quantum Cryptography and U.S. Digital Security: A Comprehensive Review: Investigating the Potential of Quantum Technologies in Creating Unbreakable Encryption and Their Future in National Security,” Computer Science & IT Research Journal, vol. 5, no. 2, pp. 390–414, 2024. https://doi.org/10.51594/csitrj.v5i2.790
[188] N. A. Samson, “Quantum computing and wireless networks security: A survey,” GSC Advanced Research and Reviews, vol. 20, no. 03, pp. 199–230, 2024. https://doi.org/10.30574/gscarr.2024.20.2.0308
[189] G. Nagar, and A. Manoharan, “The Rise of Quantum Cryptography: Securing Data Beyond Classical Means,” International Research Journal of Modernization in Engineering Technology and Science, vol. 04, no. 05, pp. 6329-6336, 2024. https://doi.org/10.56726/irjmets24238
[190] H. Li, Y. Dong, Y. Zhang, and H. Wang, “Exploration of Quantum Cryptography Security applications for industrial control systems,” Applied Mathematics and Nonlinear Sciences, vol. 9, no. 1, pp. 1–14, 2024. https://doi.org/10.2478/amns-2024-1711
[191] C. P. Prajwal, A. S. Mohan, D. N. Reddy, and K. Nimmy, “Quantum-Safe Authentication Protocol leveraging qPUF for Industrial Internet of Things,” 2024 15th International Conference on Computing Communication and Networking Technologies (ICCCNT), Kamand, India, 24-28 June 2024, pp. 1–8. https://doi.org/10.1109/ICCCNT61001.2024.10725580
[192] P. Bhattacharya, A. Kumari, S. Tanwar, I. Budhiraja, S. Patel, and J. J. P. C. Rodrigues, “Quant-Jack: Quantum Machine Learning to Detect Cryptojacking Attacks in IIoT Networks,” 2024 IEEE International Conference on Communications Workshops (ICC Workshops), Denver, CO, USA, 09-13 June 2024, pp. 865–870. https://doi.org/10.1109/ICCWORKSHOPS59551.2024.10615371
[193] K. Kannadasan, “Next Generation: Quantum-Enhanced Security for 5G Node Protection in Massive Machine-Type Communications for IIoT Applications. Multidisciplinary Journal for Applied Research in Engineering and Technology (MJARET),” vol. 4, no. 2, pp. 11–15, 2024. https://doi.org/10.54228/mjaret0624009
[194] D. Xu, K. Yu, and J. A. Ritcey, “Cross-Layer Device Authentication With Quantum Encryption for 5G Enabled IIoT in Industry 4.0,” IEEE Transactions on Industrial Informatics, vol. 18, no. 9, pp. 6368–6378, 2022. https://doi.org/10.1109/TII.2021.3130163
[195] K. K. Singamaneni, G. Dhiman, S. Juneja, G. Muhammad, S. A. Alqahtani, and J. Zaki, “A Novel QKD Approach to Enhance IIOT Privacy and Computational Knacks,” Sensors, vol. 22, no. 18, pp. 1–18, 2022. https://doi.org/https://doi.org/10.3390/s22186741
[196] S. F. Ahmad, M. Y. Ferjani, and K. Kasliwal, “Enhancing Security in the Industrial IoT Sector using Quantum Computing,” 2021 28th IEEE International Conference on Electronics, Circuits, and Systems, ICECS 2021 - Proceedings, PP. 1-18. https://doi.org/10.1109/ICECS53924.2021.9665527