Open Access iconOpen Access

REVIEW

crossmark

Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework

Inam Ullah Khan1, Fida Muhammad Khan1,*, Zeeshan Ali Haider1, Fahad Alturise2,*

1 Department of Computer Science, Qurtuba University of Science & Information Technology, Peshawar, 25000, Pakistan
2 Department of Cybersecurity, College of Computer, Qassim University, Buraydah, 51452, Saudi Arabia

* Corresponding Authors: Fida Muhammad Khan. Email: email; Fahad Alturise. Email: email

Computers, Materials & Continua 2025, 85(3), 4307-4344. https://doi.org/10.32604/cmc.2025.070189

Abstract

The rapid expansion of the Internet of Things (IoT) has introduced significant security challenges due to the scale, complexity, and heterogeneity of interconnected devices. The current traditional centralized security models are deemed irrelevant in dealing with these threats, especially in decentralized applications where the IoT devices may at times operate on minimal resources. The emergence of new technologies, including Artificial Intelligence (AI), blockchain, edge computing, and Zero-Trust-Architecture (ZTA), is offering potential solutions as it helps with additional threat detection, data integrity, and system resilience in real-time. AI offers sophisticated anomaly detection and prediction analytics, and blockchain delivers decentralized and tamper-proof insurance over device communication and exchange of information. Edge computing enables low-latency character processing by distributing and moving the computational workload near the devices. The ZTA enhances security by continuously verifying each device and user on the network, adhering to the “never trust, always verify” ideology. The present research paper is a review of these technologies, finding out how they are used in securing IoT ecosystems, the issues of such integration, and the possibility of developing a multi-layered, adaptive security structure. Major concerns, such as scalability, resource limitations, and interoperability, are identified, and the way to optimize the application of AI, blockchain, and edge computing in zero-trust IoT systems in the future is discussed.

Keywords

Internet of Things (IoT); artificial intelligence (AI); blockchain; edge computing; zero-trust-architecture (ZTA); IoT security; real-time threat detection

Cite This Article

APA Style
Khan, I.U., Khan, F.M., Haider, Z.A., Alturise, F. (2025). Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework. Computers, Materials & Continua, 85(3), 4307–4344. https://doi.org/10.32604/cmc.2025.070189
Vancouver Style
Khan IU, Khan FM, Haider ZA, Alturise F. Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework. Comput Mater Contin. 2025;85(3):4307–4344. https://doi.org/10.32604/cmc.2025.070189
IEEE Style
I. U. Khan, F. M. Khan, Z. A. Haider, and F. Alturise, “Integrating AI, Blockchain, and Edge Computing for Zero-Trust IoT Security: A Comprehensive Review of Advanced Cybersecurity Framework,” Comput. Mater. Contin., vol. 85, no. 3, pp. 4307–4344, 2025. https://doi.org/10.32604/cmc.2025.070189



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 701

    View

  • 206

    Download

  • 0

    Like

Share Link