{"id":"https://openalex.org/W4415117278","doi":"https://doi.org/10.32604/cmc.2025.070189","title":"Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework","display_name":"Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4415117278","doi":"https://doi.org/10.32604/cmc.2025.070189"},"language":"en","primary_location":{"id":"doi:10.32604/cmc.2025.070189","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.070189","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://doi.org/10.32604/cmc.2025.070189","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5039930769","display_name":"Inam Ullah Khan","orcid":"https://orcid.org/0009-0001-0086-1885"},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Inam Ullah Khan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114200182","display_name":"Fida Muhammad Khan","orcid":"https://orcid.org/0009-0004-6504-9056"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fida Muhammad Khan","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114420000","display_name":"Zeeshan Ali Haider","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Zeeshan Ali Haider","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5088232762","display_name":"Fahad Alturise","orcid":"https://orcid.org/0000-0001-9176-7984"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Fahad Alturise","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5039930769"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.43026586,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"85","issue":"3","first_page":"4307","last_page":"4344"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9381999969482422,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9381999969482422,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9172999858856201,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/edge-computing","display_name":"Edge computing","score":0.6446999907493591},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.6126999855041504},{"id":"https://openalex.org/keywords/resilience","display_name":"Resilience (materials science)","score":0.5932000279426575},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.482699990272522},{"id":"https://openalex.org/keywords/edge-device","display_name":"Edge device","score":0.4595000147819519},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.4397999942302704},{"id":"https://openalex.org/keywords/workload","display_name":"Workload","score":0.41839998960494995},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.3612000048160553}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7508000135421753},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.6446999907493591},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.6126999855041504},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.5932000279426575},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5612000226974487},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.482699990272522},{"id":"https://openalex.org/C138236772","wikidata":"https://www.wikidata.org/wiki/Q25098575","display_name":"Edge device","level":3,"score":0.4595000147819519},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4397999942302704},{"id":"https://openalex.org/C2778476105","wikidata":"https://www.wikidata.org/wiki/Q628539","display_name":"Workload","level":2,"score":0.41839998960494995},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3813999891281128},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.3612000048160553},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.3422999978065491},{"id":"https://openalex.org/C154908896","wikidata":"https://www.wikidata.org/wiki/Q2167404","display_name":"Security policy","level":2,"score":0.33899998664855957},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.32519999146461487},{"id":"https://openalex.org/C2776061582","wikidata":"https://www.wikidata.org/wiki/Q25325231","display_name":"Mobile edge computing","level":3,"score":0.30790001153945923},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.30630001425743103},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.29319998621940613},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.26499998569488525},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.2635999917984009},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.2574999928474426}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.32604/cmc.2025.070189","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.070189","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"}],"best_oa_location":{"id":"doi:10.32604/cmc.2025.070189","is_oa":true,"landing_page_url":"https://doi.org/10.32604/cmc.2025.070189","pdf_url":null,"source":{"id":"https://openalex.org/S4210191605","display_name":"Computers, materials & continua/Computers, materials & continua (Print)","issn_l":"1546-2218","issn":["1546-2218","1546-2226"],"is_oa":true,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers, Materials &amp; Continua","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":95,"referenced_works":["https://openalex.org/W2258901462","https://openalex.org/W2461410294","https://openalex.org/W2574902525","https://openalex.org/W2577611377","https://openalex.org/W2627093154","https://openalex.org/W2796206070","https://openalex.org/W2803421549","https://openalex.org/W2809282766","https://openalex.org/W2884009065","https://openalex.org/W2885413771","https://openalex.org/W2897881316","https://openalex.org/W2906687478","https://openalex.org/W2912715275","https://openalex.org/W2945233415","https://openalex.org/W2951579113","https://openalex.org/W2954485493","https://openalex.org/W2963273426","https://openalex.org/W2973613123","https://openalex.org/W3010858269","https://openalex.org/W3043272635","https://openalex.org/W3043829269","https://openalex.org/W3044495368","https://openalex.org/W3047034512","https://openalex.org/W3082989441","https://openalex.org/W3097022228","https://openalex.org/W3100601320","https://openalex.org/W3111635317","https://openalex.org/W3128350048","https://openalex.org/W3135453822","https://openalex.org/W3138917762","https://openalex.org/W3144067442","https://openalex.org/W3160052819","https://openalex.org/W3183510328","https://openalex.org/W3206079648","https://openalex.org/W3206177834","https://openalex.org/W3210731496","https://openalex.org/W4200177993","https://openalex.org/W4213165079","https://openalex.org/W4220934828","https://openalex.org/W4220983461","https://openalex.org/W4280578008","https://openalex.org/W4281680764","https://openalex.org/W4282945617","https://openalex.org/W4283820151","https://openalex.org/W4285008927","https://openalex.org/W4285205927","https://openalex.org/W4293218370","https://openalex.org/W4293239214","https://openalex.org/W4312880205","https://openalex.org/W4313071569","https://openalex.org/W4313194477","https://openalex.org/W4318049614","https://openalex.org/W4321375211","https://openalex.org/W4364856260","https://openalex.org/W4376137834","https://openalex.org/W4376455422","https://openalex.org/W4378627652","https://openalex.org/W4386490237","https://openalex.org/W4387453400","https://openalex.org/W4389160648","https://openalex.org/W4390954673","https://openalex.org/W4391481282","https://openalex.org/W4391917758","https://openalex.org/W4391947426","https://openalex.org/W4392101470","https://openalex.org/W4392388527","https://openalex.org/W4392739260","https://openalex.org/W4393259376","https://openalex.org/W4399744879","https://openalex.org/W4400362806","https://openalex.org/W4400402722","https://openalex.org/W4401527103","https://openalex.org/W4401534965","https://openalex.org/W4401906271","https://openalex.org/W4401983747","https://openalex.org/W4402616570","https://openalex.org/W4403779923","https://openalex.org/W4404627439","https://openalex.org/W4406067657","https://openalex.org/W4406385285","https://openalex.org/W4406533665","https://openalex.org/W4406614020","https://openalex.org/W4406617778","https://openalex.org/W4407080703","https://openalex.org/W4407364625","https://openalex.org/W4407636288","https://openalex.org/W4407904448","https://openalex.org/W4407917880","https://openalex.org/W4407996992","https://openalex.org/W4408399679","https://openalex.org/W4408520071","https://openalex.org/W4408564557","https://openalex.org/W4412908108","https://openalex.org/W4412909425","https://openalex.org/W4412909548"],"related_works":[],"abstract_inverted_index":{"The":[0,24,53,124,146],"rapid":[1],"expansion":[2],"of":[3,6,21,55,106,153,168,174,199],"the":[4,16,43,118,122,136,140,166,172,193,197,210],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9],"introduced":[10],"significant":[11],"security":[12,28,127,179],"challenges":[13],"due":[14],"to":[15,139,195],"scale,":[17],"complexity,":[18],"and":[19,65,81,91,94,98,104,116,133,171,188,192,202],"heterogeneity":[20],"interconnected":[22],"devices.":[23,123],"current":[25],"traditional":[26],"centralized":[27],"models":[29],"are":[30,160,190],"deemed":[31],"irrelevant":[32],"in":[33,39,84,162,205,209],"dealing":[34],"with":[35,75],"these":[36,154],"threats,":[37],"especially":[38],"decentralized":[40,97],"applications":[41],"where":[42],"IoT":[44,164,207],"devices":[45],"may":[46],"at":[47],"times":[48],"operate":[49],"on":[50,135],"minimal":[51],"resources.":[52],"emergence":[54],"new":[56],"technologies,":[57,155],"including":[58],"Artificial":[59],"Intelligence":[60],"(AI),":[61],"blockchain,":[62,201],"edge":[63,203],"computing,":[64],"Zero-Trust-Architecture":[66],"(ZTA),":[67],"is":[68,150,212],"offering":[69],"potential":[70],"solutions":[71],"as":[72,184],"it":[73],"helps":[74],"additional":[76],"threat":[77],"detection,":[78],"data":[79],"integrity,":[80],"system":[82],"resilience":[83],"real-time.":[85],"AI":[86],"offers":[87],"sophisticated":[88],"anomaly":[89],"detection":[90],"prediction":[92],"analytics,":[93],"blockchain":[95],"delivers":[96],"tamper-proof":[99],"insurance":[100],"over":[101],"device":[102,132],"communication":[103],"exchange":[105],"information.":[107],"Edge":[108],"computing":[109,204],"enables":[110],"low-latency":[111],"character":[112],"processing":[113],"by":[114,128],"distributing":[115],"moving":[117],"computational":[119],"workload":[120],"near":[121],"ZTA":[125],"enhances":[126],"continuously":[129],"verifying":[130],"each":[131],"user":[134],"network,":[137],"adhering":[138],"\u201cnever":[141],"trust,":[142],"always":[143],"verify\u201d":[144],"ideology.":[145],"present":[147],"research":[148],"paper":[149],"a":[151,176],"review":[152],"finding":[156],"out":[157],"how":[158],"they":[159],"used":[161],"securing":[163],"ecosystems,":[165],"issues":[167],"such":[169,183],"integration,":[170],"possibility":[173],"developing":[175],"multi-layered,":[177],"adaptive":[178],"structure.":[180],"Major":[181],"concerns,":[182],"scalability,":[185],"resource":[186],"limitations,":[187],"interoperability,":[189],"identified,":[191],"way":[194],"optimize":[196],"application":[198],"AI,":[200],"zero-trust":[206],"systems":[208],"future":[211],"discussed.":[213]},"counts_by_year":[],"updated_date":"2026-03-07T16:01:11.037858","created_date":"2025-10-14T00:00:00"}
