Investigating Security Requirements for Reliable Internet of Things (IoT) Systems: A Review
Keywords:
IoT Security, Data Confidentiality, Authentication, Access Control, Privacy, Threat Analysis, Secure Architecture, Artificial Intelligence, Internet of ThingsAbstract
The Internet of Things (IoT) has been instrumental in infusing cross-domain connectivity among devices for the very purpose of making better automation and decisions on data input. However, with its infrequent deployment, a lot of security challenges arise that may hamper system dependability and user trust. This paper considers critical sets of security requisites that are mandatory towards making a strong, dependable IoT system. By conducting a systematic literature review, it identifies key security issues, including data confidentiality, data integrity, authentication, access control, and privacy. Furthermore, possible threats and attacks found in IoT environments are analysed and classified across communication channels, devices and services, users, mobility, and resource integration. Based on the analysis, the key security requirements are then suggested, and these mitigations of vulnerabilities will lead to the secure design of an IoT architecture. The work considers solutions starting from device-level security to secure communication, stronger authentication, and privacy measures. Putting into practice all of these security requirements will improve resilience against attacks, reduce possible threats posed by malicious/unauthorised access, and ensure reliable operation of the system. This work stresses the importance of considering security early in the designing phase of IoT systems for their dependable and secure deployment into various applications such as smart homes, healthcare, industrial automation, and smart cities. Taking measures to address these challenges will, in turn, result in IoT systems possessing enhanced reliability, data integrity, and user confidence in the increasingly interwoven digital environment.
References
Kesavan E. Internet of Things (IoT): A Review of Security Challenges and Solutions. International Journal of Innovations in Science, Engineering And Management. 2023 Dec;2(4):65-71.
Sharma P, Jasim LH, Sripriya T, Sharma D, Sapaev IB, Kulshreshtha K, Ramesh G. Security and Privacy in Internet of Things: Challenges and Solutions. In2023 International Conference for Technological Engineering and its Applications in Sustainable Development (ICTEASD) 2023 Nov 14 (pp. 314-319). IEEE.
Mahadik SS, Pawar PM, Muthalagu R. Heterogeneous IoT (HetIoT) security: techniques, challenges and open issues. Multimedia Tools and Applications. 2024 Apr;83(12):35371-412.
Published
Issue
Section
Copyright (c) 2026 Journal of Engineering Design and Analysis

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
We, the undersigned, give an undertaking to the following effect with regard to our article entitled
“_______________________________________________________________________________________________________________________________________________________________________________
________________________________________________________________________________” submitted for publication in (Journal title)________________________________________________ _______________________________________________________Vol.________, Year _________:-
1. The article mentioned above has not been published or submitted to or accepted for publication in any form, in any other journal.
2. We also vouchsafe that the authorship of this article will not be contested by anyone whose name(s) is/are not listed by us here.
3. I/We declare that I/We contributed significantly towards the research study i.e., (a) conception, design and/or analysis and interpretation of data and to (b) drafting the article or revising it critically for important intellectual content and on (c) final approval of the version to be published.
4. I/We hereby acknowledge ADRs conflict of interest policy requirement to scrupulously avoid direct and indirect conflicts of interest and, accordingly, hereby agree to promptly inform the editor or editor's designee of any business, commercial, or other proprietary support, relationships, or interests that I/We may have which relate directly or indirectly to the subject of the work.
5. I/We also agree to the authorship of the article in the following sequence:-
Authors' Names (in sequence) Signature of Authors
1. _____________________________________ _____________________________________
2. _____________________________________ _____________________________________
3. _____________________________________ _____________________________________
4. _____________________________________ _____________________________________
5. _____________________________________ _____________________________________
6. _____________________________________ _____________________________________
7. _____________________________________ _____________________________________
8. _____________________________________ _____________________________________
Important
(I). All the authors are required to sign independently in this form in the sequence given above. In case an author has left the institution/ country and whose whereabouts are not known, the senior author may sign on his/ her behalf taking the responsibility.
(ii). No addition/ deletion/ or any change in the sequence of the authorship will be permissible at a later stage, without valid reasons and permission of the Editor.
(iii). If the authorship is contested at any stage, the article will be either returned or will not be
processed for publication till the issue is solved.