Risks and Challenges of the Internet of Things: An Analytical Review of Previous Studies and Future Research Directions

Authors

  • Zaid A. Alsarray College of Biomedical Informatics, University of Information Technology and Communications, Baghdad, Iraq.
  • Sanaa Ahmed Kadhim College of Biomedical Informatics, University of Information Technology and Communications, Baghdad, Iraq.

The Internet of Things (IoT) has become a transformational strength in various fields, including health services, production and urban infrastructure. Although it enables automation and data exchange in real time, it also introduces sufficient risks that cannot be ignored. This article makes a comprehensive review of existing literature to detect the most pressure related challenges associated with IoT, including security weaknesses, privacy considerations, inter -Boundaries and questions of stability. This emphasizes how the growing number interacted equipment expands the surface of the cyber-attacks, often increased by old firmware, weak encryption and incompatible standards. In response, recent research has suggested integration of blockchain, artificial intelligence and slightly cryptography as a possible solution. However, practical purposes are interrupted by the lack of energy and scalable, the requirement for adaptive structure. The study also emphasized the role of new technologies such as edge calculation and 5G to remove delay and reliability problems. In addition, the data protection and generation -related moral and regulatory complications discuss. By synthesizing insights from recent studies, the paper suggests future research directions, aimed at developing energy networks, safe and standardized IoT ecosystem.

Keywords:

Internet of Things, Cybersecurity, Interoperability, Edge Computing, Data Privacy, Blockchain, Energy Efficiency, Machine Learning

[1] Adeoye, S., & Adams, R. (2024). Revolutionizing Healthcare : The Impact and Future of the Internet of Things ( IoT ) in the Health Sector. 4(10), 127–143. https://doi.org/ 10.47760/ cognizance .2024 .v04i10.009

[2] Ahluwalia, A., Garg, V., Kapoor, S., & Gupta, L. (2024). The Internet of Things (IoT): Transformations and Challenges in the Modern World. African Journal of Biological Sciences, 6(3), 764–769. https://doi.org/10.48047/afjbs.6.3.2024.764-769

[3] Al Khatib, I., Shamayleh, A., & Ndiaye, M. (2024). Healthcare and the Internet of Medical Things: Applications, Trends, Key Challenges, and Proposed Resolutions. Informatics, 11(3), 47. https://doi.org/10.3390/informatics11030047

[4] Aljaafari, F., Menezes, R., Mustafa, M. A., & Cordeiro, L. C. (2021). Finding Security Vulnerabilities in IoT Cryptographic Protocol and Concurrent Implementations. 1–16.

[5] Benedicta Ehimuan, Ogugua Chimezie, Ob, Onyinyechi Vivian Akagha, Oluwatosin Reis, & Bisola Beatrice Oguejiofor. (2024). Global data privacy laws: A critical review of technology’s impact on user rights. World Journal of Advanced Research and Reviews, 21(2), 1058–1070. https://doi.org/10.30574/wjarr.2024.21.2.0369

[6] Benomar, Z., Garofalo, M., Georgantas, N., Longo, F., Merlino, G., Puliafito, A., Benomar, Z., Garofalo, M., Georgantas, N., Longo, F., Merlino, G., Benomar, Z., Garofalo, M., Georgantas, N., & Longo, F. (2024). Bridging IoT Protocols with the Web of Things : A Path to Enhanced Interoperability To cite this version : HAL Id : hal-04708266 Bridging IoT Protocols with the Web of Things : A Path to Enhanced Interoperability.

[7] Bhamare, H., Vidhate, A., & Padiya, P. (2024). P rivacy And Security Issues In Iot Systems. 14, 1352–1365.

[8] Bonaventura, D., Esposito, S., & Bella, G. (2024). The IoT Breaches your Household Again. ArXiv Preprint ArXiv:2407.12159.

[9] Cappelle, J., Van der Perre, L., Fitzgerald, E., Ravyts, S., Gajda, W., De Smedt, V., Cox, B., & Callebaut, G. (2024). IoT on the Road to Sustainability: Vehicle or Bandit? ArXiv Preprint ArXiv:2405.20706.

[10] Chang, K. C., Niu, H., Kim, B., & Barber, S. (2024). IoT Privacy Risks Revealed. Entropy, 26(7). https://doi.org/10.3390/e26070561

[11] Coallier, F. (2022). IoT Standardization Strategies in ISO/IEC JTC 1/SC 41. 2022 IEEE 8th World Forum on Internet of Things (WF-IoT), 1–6.

[12] Cuozzo, G., Testi, E., Riolo, S., Miuccio, L., Cena, G., Pasolini, G., De Nardis, L., Panno, D., Chiani, M., & Di Benedetto, M.-G. (2024). Research Directions and Modeling Guidelines for Industrial Internet of Things Applications. ArXiv Preprint ArXiv:2410.02610.

[13] da Silva, M. V. B., Barbosa, M., Queiroz, A., & Dias, K. L. (2025). A 5G-Edge Architecture for Computational Offloading of Computer Vision Applications. ArXiv Preprint ArXiv:2501.04267.

[14] Deepthi, K. J., Balakrishnan, T. S., Krishnan, P., & Ebenezar, U. S. (2024). Optimized Data Storage Algorithm of IoT Based on Cloud Computing in Distributed System. 2024 OPJU International Technology Conference (OTCON) on Smart Computing for Innovation and Advancement in Industry 4.0, 1–5.

[15] Dickerson, K., García-Castro, R., Kostelnik, P., & Paralič, M. (2021). Standards for the IoT. In C. Zivkovic, Y. Guan, & C. Grimm (Eds.), IoT Platforms, Use Cases, Privacy, and Business Models: With Hands-on Examples Based on the VICINITY Platform (pp. 125–147). Springer International Publishing. https://doi.org/10.1007/978-3-030-45316-9_6

[16] Dickson, S. M., & Ijeoma Peace OKECHUKWU. (2024). Internet of Things (IoT) Data Communication Challenges, and Solutions. Journal of Digital Learning and Distance Education, 2(11), 803–808. https://doi.org/10.56778/jdlde.v2i11.226

[17] Ebbers, F., & Friedewald, M. (2023a). Responses of the European IoT Ecosystem to the European General Data Protection Regulation. 1–18.

[18] Ebbers, F., & Friedewald, M. (2023b). Responses of the European IoT Ecosystem to the European General Data Protection Regulation.

[19] Edje, A. E., Abd Latiff, M. S., & Chan, W. H. (2023). IoT data analytic algorithms on edge-cloud infrastructure: A review. Digital Communications and Networks, 9(6), 1486–1515.

[20] Gaborović, A., Karić, K., Blagojević, M., & Plašić, J. (2022). Comparative analysis of ISO/IEC and IEEE standards in the field of Internet of Things.

[21] Garah, A., Mbarek, N., & Kirgizov, S. (2023). IoT Data Confidentiality Self-Management. 2023 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 395–400.

[22] Ghaiumy Anaraky, R., Li, Y., Cho, H., Huang, D. Y., Byrne, K. A., Knijnenburg, B., & Nov, O. (2024). Personalizing Privacy Protection With Individuals’ Regulatory Focus: Would You Preserve or Enhance Your Information Privacy? Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems, 1–17.

[23] Goel, P. K., Singh, G., Chattopadhyay, S., Vishwakarma, P., Jain, A., & Aeri, M. (2024). Privacy-Preserving Techniques for Data Sharing in the Era of IoT. 2024 International Conference on Communication, Computer Sciences and Engineering (IC3SE), 1053–1058.

[24] Gupta, S., & Sharma, P. (2024). Sustainability Integration in Smart Cities: Future Generation Smart Systems. Available at SSRN 5077694.

[25] Igwebuike, C., & Girma, A. (2024). Analysis of Low-Power Wide-Area Network (LPWAN) Internet of Things (IoT) Telemetry System with Wireline Solution Approach Recommendation. 2024 International Conference on Electrical, Computer and Energy Technologies (ICECET, 1–6.

[26] Ishola, A. (2024). IoT applications in sustainability and sustainable community development. World Journal of Advanced Research and Reviews _ Awaiting DOI.

[27] Jose J, M. D., Kumar, D. D. V., & Jayakeerthi, M. (2024). Iot in the Modern World. Futuristic Trends in Computing Technologies and Data Sciences Volume 3 Book 8, 3, 284–290. https://doi.org/10.58532/v3bkct8p4ch2

[28] Kamble, N. N., & Kulkarni, D. A. (2024). Internet of Things (Iot) and Smart World. In Futuristic Trends in Physical Sciences Volume 3 Book 1 (Vol. 3). https://doi.org/10.58532/v3bkps1ch13

[29] Karaush, Y., & Patlaienko, M. (2024). Evaluating IoT Low Power Wide Area Networks for Smart City Solutions. 2024 32nd National Conference with International Participation (TELECOM), 1–4.

[30] Kolapo, R., Kawu, F. M., Abdulmalik, A. D., Edem, U. A., & Atisi, M. (2024). Edge computing : Revolutionizing data processing for IoT applications. 13(02), 23–29.

[31] Kumar, Y., Kumar, P., & Kumar, B. (2025). Impact Assessment of E‐Waste: Environment and Society. Global Waste Management, 115–144.

[32] Lee, M. (2023). An Empirical Survey on the Cybersecurity of the Industrial Internet of Things An Empirical Survey on the Cybersecurity of the Industrial Internet of Things.

[33] Li, Z., & Cao, K. (2024). Application and Challenge of Edge Computing Based on 5G Communication in Information and Communication Systems. 8(6), 39–45.

[34] Liu, Z. (2024). Compatibility and optimization Strategy of Multiple Network Protocols in the Internet of Things Installation and Debugging Training Bench. 2024 International Conference on Intelligent Algorithms for Computational Intelligence Systems (IACIS), 1–6.

[35] Luntovskyy, A., & Globa, L. (2019). Performance, reliability and scalability for IoT. 2019 International Conference on Information and Digital Technologies (IDT), 316–321.

[36] Mahlake, N., Mathonsi, T. E., Du Plessis, D., & Muchenje, T. (2023). A Lightweight Encryption Algorithm to Enhance Wireless Sensor Network Security on the Internet of Things. J. Commun., 18(1), 47–57.

[37] Miura, N., Taguchi, H., Watanabe, K., Nohara, M., Makita, T., Tanabe, M., Wakimoto, T., Kumagai, S., Nosaka, H., & Aratake, A. (2024). 17.4 Environmentally-Friendly Disposable Circuit and Battery System for Reducing Impact of E-Wastes. 2024 IEEE International Solid-State Circuits Conference (ISSCC), 67, 320–322.

[38] Mühlhoff, R., & Ruschemeier, H. (2024). Predictive analytics and the collective dimensions of data protection. Law, Innovation and Technology, 16(1), 261–292.

[39] N, A. K., Ramesh, D. D., S, D. P. H., R, D. P., & G., V. B. (2023). Securing Iot Data Transmission: A Comprehensive Approach Integrating Two-Fish Encryption With Wireless Smart Energy Systems And Iot Cloud Services. Migration Letters, 21(S1), 972–993. https://doi.org/10.59670/ml.v20i3.7269

[40] Ntayagabiri, J. P., Bentaleb, Y., Ndikumagenge, J., & Makhtoum, H. E. L. (2024). A Comprehensive Approach to Protocols and Security in Internet of Things Technology.

[41] Nurgaliyev, K., Tokhmetov, A., & Tanchenko, L. (2024). an Analysis of the Heterogeneous Iot Device Network Interaction in a Cyber-Physical System. Scientific Journal of Astana IT University, 53–68. https://doi.org/10.37943/16enna6243

[42] Patel, S., Patidar, P. K., & Patidar, M. (2024). IoT Applications in Healthcare and Industry : Current State , Challenges , and Future Perspectives. 89–96. https://doi.org/10.48175/IJARSCT-22614

[43] Pravylo, V., & Averkiiev, Y. (2024). Analysing Malicious Software Supporting Ddos Attacks on Iot Networks. Information and Telecommunication Sciences, 0(1), 50–54. https://doi.org/ 10.20535/ 2411-2976.12024.50-54

[44] Rajendra Mahto, & Dr. Nidhi Mishra. (2024). An Investigation on Handling IoT Big Data with RBSEE Architecture. Journal of Advances in Science and Technology, 21(1), 97–104. https://doi.org/10.29070/j4f6hq17

[45] Rasheed, A., & Alnabhan, M. (2024). Detection of Botnet Attacks on IoT Using AI. 2024 International Jordanian Cybersecurity Conference (IJCC), 7–13.

[46] Richa, E. (2021). IoT: Security Issues and Challenges. Smart Innovation, Systems and Technologies, 196(12), 87–96. https://doi.org/10.1007/978-981-15-7062-9_9

[47] Rozlomii, I., Yarmilko, A., & Naumenko, S. (2025). Innovative resource-saving security strategies for IoT devices. Journal of Edge Computing.

[48] Sahu, S. K., & Mazumdar, K. (2024). Exploring security threats and solutions Techniques for Internet of Things (IoT): from vulnerabilities to vigilance. Frontiers in Artificial Intelligence, 7(May), 1–16. https://doi.org/10.3389/frai.2024.1397480

[49] Said, N. M. M., Ali, S. M., Shaik, N., Begum, K. M. J., Shaban, A. A. A. E., & Samuel, B. E. (2024). Analysis of Internet of Things to Enhance Security Using Artificial Intelligence based Algorithm. Journal of Internet Services and Information Security, 14(4), 590–604. https://doi.org/10.58346/JISIS.2024.I4.037

[50] Salman, A. S., Mahmoud, A., Yaseen, A. H., Ahmed, O. S., & Abdullah, M. Y. (n.d.). The synergistic impact of 5g on internet of things innovation and growth.

[51] Satchithanantham, U. (2024). Significant Security Challenges in IOT Analytics. International Journal of Communication and Information Technology, 5(1), 01–05. https://doi.org/ 10.33545/ 2707661x.2024.v5.i1a.71

[52] Sebestyen, H., Popescu, D. E., & Zmaranda, R. D. (2024). Security in the Internet of Things : Identifying and Analysing Critical Categories Security in the Internet of Things : Identifying and Analysing Critical Categories. 0–30. https://doi.org/ 10.20944/ preprints202412.2512.v1

[53] Sehito, N., Yang, S., Larik, R. S. A., Kamal, M. M., Alwabli, A., & Ullah, I. (2024). Artificial Intelligence (AI) and Internet of Things (IoT) Applications in Sustainable Technology. In Artificial General Intelligence (AGI) Security: Smart Applications and Sustainable Technologies (pp. 227–246). Springer.

[54] Sharma, A., & Babbar, H. (2024). IoT-POT: Machine Learning-based Detection of Mirai Botnet Attacks in IoT. 2024 First International Conference on Innovations in Communications, Electrical and Computer Engineering (ICICEC), 1–6.

[55] Shukla, R., Choudhary, A. K., Kumar, V. S., Tyagi, P., Mutharasan, A., Kumar, S., & Gupta, S. K. (2024). Understanding integration issues in intelligent transportation systems with IoT platforms, cloud computing, and connected vehicles. Journal of Autonomous Intelligence, 7(4), 1–13. https://doi.org/10.32629/jai.v7i4.1043

[56] Singh, K., Yadav, M., Singh, Y., Barak, D., Saini, A., & Moreira, F. (2024). Reliability on the Internet of Things with designing approach for exploratory analysis. Frontiers in Computer Science, 6. https://doi.org/10.3389/fcomp.2024.1382347

[57] Spohn, M. A. (2022). On MQTT Scalability in the Internet of Things: Issues, Solutions, and Future Directions. Journal of Electronics and Electrical Engineering, 1(1), 4. https://doi.org/10.37256/jeee.1120221687

[58] Staaf, H. (2025). The future of green tech : Self-powered IoT sensors. January, 1–5.

[59] Strzoda, A., & Grochla, K. (2024). A Nature-Inspired Approach to Energy-Efficient Relay Selection in Low-Power Wide-Area Networks (LPWAN). Sensors, 24(11), 3348.

[60] Szymoniak, S., Piątkowski, J., & Kurkowski, M. (2025). Defense and Security Mechanisms in the Internet of Things: A Review. Applied Sciences (2076-3417), 15(2).

[61] Timenko, A. V., Shkarupylo, V. V., Kulykovska, N. A., & Hrushko, S. S. (2024). Study of the method of controlling the compatibility of Internet of Things devices based on the MQTT application layer protocol. Herald of Advanced Information Technology, 7(1), 48–58. https://doi.org/10.15276/hait.07.2024.4

[62] Touqir, A., & Haas, O. (2024). Systematic Review of Fuzzing in IoT : Evaluating Techniques , Vulnerabilities , and Research Gaps. 1–30.

[63] Tripathi, D. R., & Kuthe, B. S. (2024). Optimizing IOT Network Performance : A Study on Low-Power Wide-Area Network ( LPWAN ) Technologies for Smart City Applications. October.

[64] Vojković, G., Milenković, M., & Katulić, T. (2020). IoT and smart home data breach risks from the perspective of data protection and information security law. Business Systems Research: International Journal of the Society for Advancing Innovation and Research in Economy, 11(3), 167–185.

[65] Volynets, V., Popov, A., Pushkar, T., Frolov, M., & Babarytskyi, O. (2025). Legal Aspects of Using the Internet of Things (Iot) in Electronic Commerce. Journal of Lifestyle and SDG’S Review, 5(2), 1–17. https://doi.org/10.47172/2965-730X.SDGsReview. v5.n02. pe03657

[66] Weber, R. H., & Weber, R. (2016). Internet of Things Archives | Internet of Things. Cisco, 2019(July 2016), 1–47.

[67] Xun, L. (2024). Bridging IoT Protocols with the Web of Things: A Path to Enhanced Interoperability. International Journal of High Speed Electronics and Systems, 2540049.

[68] Zahra, Y. (2025). Regulating AI in Legal Practice: Challenges and Opportunities. Journal of Computer Science Application and Engineering (JOSAPEN), 3(1), 10–15.

[69] Zayn, M., & Miran, K. (2024). Harmony in Connectivity: Toward a Sustainable Future with Green Internet. International Journal for Research in Applied Science and Engineering Technology, 12(2), 1363–1367. https://doi.org/10.22214/ijraset.2024.58599

[70] Zhang, Y., Yang, J., Lei, H., Bao, Z., Lu, N., Shi, W., & Chen, B. (2023). PACTA: An IoT data privacy regulation compliance scheme using TEE and blockchain. IEEE Internet of Things Journal, 11(5), 8882–8893.

[71] Jaafar Ahmed Abdulsaheb, Raghad Mohanned Nafea, Waleed Ameen Mahmoud Al-Jawher, Mohammed Lateef Hayyawi “IoT Based Smart Parking System” Authors Publication date 2024/6/28, Journal Journal Port Science Research, Volume 7, Issue 3, Pages . 196-203, 2024.

[72] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher “Uruk 4D discrete chaotic map for secure communication applications” Journal Port Science Research, Volume 5, Issue 3, Pages 131-142, 2023.

[73] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher “Hybrid image encryption algorithm based on compressive sensing, gray wolf optimization, and chaos” Journal of Electronic Imaging, Volume 32, Issue 4, Pages 043038-043038, 2023.

[74] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher “WAM 3D discrete chaotic map for secure communication applications” International Journal of Innovative Computing, Volume 13, Issue 1-2, Pages45-54, 2022.

[75] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher “A Hybrid Domain Medical Image Encryption Scheme Using URUK and WAM Chaotic Maps with Wavelet–Fourier Transforms” Journal of Cyber Security and Mobility, Pages 435-464, 2023.

[76] Qutaiba K Abed, Waleed A Mahmoud Al-Jawher “A Robust Image Encryption Scheme Based on Block Compressive Sensing and Wavelet Transform” International Journal of Innovative Computing, Volume 13, Issue 1-2, Pages 7-13, 2022.

[77] Hamid M Hasan, Waleed A Mahmoud Al-Jawher, Majid A Alwan “3-d face recognition using improved 3d mixed transform” Journal International Journal of Biometrics and Bioinformatics (IJBB), Volume 6, Issue 1, Pages 278-290, 2012.

[78] Hamid M Hasan, AL Jouhar, Majid A Alwan “Face recognition using improved FFT based radon by PSO and PCA techniques” International Journal of Image Processing (IJIP), Volume 6, Issue 1, Pages 26-37, 2012.

[79] Waleed A Mahmoud, Afrah Loay Mohammed Rasheed “ 3D Image Denoising by Using 3D Multiwavelet” AL-Mustansiriya J. Sci, Volume 21, Issue 7, Pages 108-136, 2010.

[80] AHM Al-Helali, WA Mahmmoud, HA Ali “‘A Fast personal palmprint authentication Based on 3d-multi Wavelet Transformation” TRANSNATIONAL JOURNAL OF SCIENCE AND TECHNOLOGY, Volume 2, Issue 8, 2012.

[81] Waleed A Mahmoud Al-Jawher, Sarah H Awad “A proposed brain tumor detection algorithm using Multi wavelet Transform (MWT)” Materials Today: Proceedings, Volume 65, Pages 2731-2737, 2022.

[82] W. A. Mahmoud, J J. Stephan and A. A. Razzak “Facial Expression Recognition Using Fast Walidlet Hybrid Transform” Journal port Science Researchو Volume3, No:1, Pages 59-69, 2020.

[83] Walid Amin Mahmoud “Computation of wavelet and multiwavelet transforms using fast fourier transform” Journal Port Science Research, Volume 4, Issue 2. Pages 111-117, 2021.

[84] Zahraa A Hasan, Suha M Hadi, Waleed A Mahmoud “Time domain speech scrambler based on particle swarm optimization” Pollack Periodica, Volume 18, Issue 1, Pages 161-166, 2023.

[85] Rasha Ali Dihin, Waleed A Mahmoud Al-Jawher, Ebtesam N AlShemmary “Diabetic retinopathy image classification using shift window transformer” International Journal of Innovative Computing, Volume 13, Issue 1-2, Pages 23-29, 2022.

[86] [86] Ebtesam N. AlShemmary and Waleed A. Mahmoud Al-Jawher Rasha Ali Dihin “Automated Binary Classification of Diabetic Retinopathy by SWIN Transformer” Journal of Al-Qadisiyah for computer science and mathematics (JQCM), Volume 15,Issue 1, Pages 169-178, 2023.

[87] Zahraa A Hasan, Suha M Hadi, Waleed A Mahmoud “Speech scrambler with multiwavelet, Arnold Transform and particle swarm optimization” Pollack Periodica, Volume 18, Issue 3, Pages 125-131, 2023.

[88] Ali Akram Abdul-Kareem, Waleed Ameen Mahmoud Al-Jawher “An image encryption algorithm using hybrid sea lion optimization and chaos theory in the hartley domain” International Journal of Computers and Applications, Volume 46, Issue 5, Pages 324-337, 2024.

[89] Rasha Ali Dihin, Ebtesam N AlShemmary, Waleed AM Al-Jawher “Wavelet-Attention Swin for Automatic Diabetic Retinopathy Classification” Baghdad Science Journal, Volume 21, Issue 8, Pages 2741-2741, 2024.

[90] Lubna K Alazzawi, Ali M Elkateeb, Aiyappa Ramesh, Waleed Aljuhar, “Scalability analysis for wireless sensor networks routing protocols” 22nd International Conference on Advanced Information Networking and Applications-Workshops (aina workshops 2008), Pages 139-144, 2008.

[91] Waleed Al-Jawhar, Abbas Hasan Kattoush, Sulaiman M Abbas, Ali T Shaheen “A high performance parallel Radon based OFDM transceiver design and simulation” Digital Signal Processing, Volume 18, Issue 6, Pages 907-918, 2008.

[92] Maryam I Mousa Al-Khuzaay, Waleed A Mahmoud Al-Jawher “New Proposed Mixed Transforms: CAW and FAW and Their Application in Medical Image Classification” International Journal of Innovative Computing, Volume 13, Issue 1-2, Pages 15-21, 2022.

[93] AHM Al-Heladi, WA Mahmoud, HA Hali, AF Fadhel “Multispectral Image Fusion using Walidlet Transform” Advances in Modelling and Analysis B, Volume 52, Issue 1-2, Pages 1-20, 2009.

[94] Qutaiba K Abed, Waleed A Mahmoud Al-Jawher “Optimized color image encryption using arnold transform, URUK chaotic map and GWO algorithm” Journal Port Science Research, Volume 7, Issue 3, Pages, . 219-236, 2024.

[95] Salman Waleed A. Mahmud Al-Jouhar, Dr. Talib M. Jawad Abbas Al-Talib, R. HamudiA. “Fingerprint Image Recognition Using Walidlet Transform” Australian Journal of Basic and Applied Sciences, Australia, 2012.

[96] Haqi Khalid, Shaiful Jahari Hashim, Fazirulhisyam Hashim, Waleed Ameen Mahmoud Al-Jawher, Muhammad Akmal Chaudhary, Hamza HM Altarturi “Raven: Robust anonymous vehicular end-to-end encryption and efficient mutual authentication for post-quantum intelligent transportation systems” IEEE Transactions on Intelligent Transportation Systems, 2024.

[97] Waleed A Mahmoud Al-Jawher, Shaimaa A Shaaban “K-Mean Based Hyper-Metaheuristic Grey Wolf and Cuckoo Search Optimizers for Automatic MRI Medical Image Clustering” Journal Port Science Research, Volume 7, Issue 5, Pages 109-120, 2024.

[98] Jane Jaleel Stephan and A. A. W. Razzak W. A. Mahmoud “Facial Expression Recognition from Video Sequence Using Self Organizing Feature Map” Journal port Science Researchو TRANSACTION ON ENGINEERING, TECHNOLOGY AND THEIR APPLICATIONS, Volume 4, Issue 2, 2021.

[99] Walid A Mahmoud, Majed E Alneby, Wael H Zayer “Multiwavelet Transform and Multi-Dimension -Two Activation Function Wavelet Network Using for Person Identification” IJCCCE, Volume 11, Issue 1, Pages 46-61, 2011.

[100] Waleed Ameen Mahmoud, Ommama Razzak “Speech recognition using new structure for 3D neural network” 2010, University of Technology, 1st Computer Conference, Pages . 161-171, ttps://cs.uotechnology.edu.iq/index.php/112-about-dept-en/394-conf-2010

[101] A. Barsoum and Entather Mahos Waleed. A. .Mahmoud “Fuzzy Wavenet (FWN) classifier for medical images” Al-Khwarizmi Engineering Journal, Volume 1, Issue 2, Pages 1-13, 2005.

[102] Waleed A. Mahmoud, Ahmed S Hadi “Systolic Array for Realization of Discrete Wavelet Transform” Journal of Engineering, Volume 13, Issue 02, Pages 1368-1377, 2007.

[103] W. A. Mahmoud & I.K. Ibraheem “Image Denoising Using Stationary Wavelet Transform” Signals, Inf. Patt. Proc. & Class, .Volume 46, Issue 4, Pages 1-18, 2003.

[104] WA Mahmoud, IA Al-Akialy “A Tabulated Method of Computation Multiwavelet Transform” Journal of AL-Rafidain University College for Sciences, Volume 15, Issue 1, Pages 161-170, 2004.

[105] Saadi Mohammed Saadi, Waleed Al-Jawher “Enhancing image authenticity: A new approach for binary fake image classification using DWT and swin transformer” Global Journal of Engineering and Technology Advances, Volume 19, Issue 3, Pages 1-10, 2024.

[106] Abbas Hasan Kattoush, W Al-Jawhar, A Ghodayyah “Multiwavelet computed Radon-based OFDM transceiver designed and simulation under different channel conditions” Journal of Information & Computing Science, Volume 5, Issue 2, Pages 133-145, 2010.

Risks and Challenges of the Internet of Things: An Analytical Review of Previous Studies and Future Research Directions. (2025). Journal Port Science Research, 8(4). https://doi.org/10.36371/port.2025.4.5

How to Cite

Risks and Challenges of the Internet of Things: An Analytical Review of Previous Studies and Future Research Directions. (2025). Journal Port Science Research, 8(4). https://doi.org/10.36371/port.2025.4.5