Open Access
REVIEW
Machine Learning-Enabled NTN-Assisted IoT: Mapping the Security Landscape
1 Department of Communication Technology and Network, Faculty of Computer Science and Information Technology, Universiti Putra Malaysia, UPM, Serdang, Selangor, Malaysia
2 Department of Information Technology, Gulf Colleges, Hafar Al Batin, Saudi Arabia
3 Computer Science Department, Faculty of Science and Humanities, Imam Abdulrahman bin Faisal University, Jubail, Saudi Arabia
4 Systems Modeling, Analysis, and Control Research Laboratory (MACS), University of Gabes, Avenue Omar Ibn El Khattab, Zrig Eddakhlania, Zrig Gabes, Tunisia
5 Department of Computer Science, Faculty of Computing and Artificial Intelligence, Taraba State University, ATC, Jalingo, Nigeria
6 Department of Electrical, Electronics & Systems Engineering, Faculty of Engineering & Built Environment, Universiti Kebangsaan Malaysia, UKM, Bangi, Selangor, Malaysia
* Corresponding Author: Zurina Mohd Hanapi. Email:
Computers, Materials & Continua 2026, 88(1), 5 https://doi.org/10.32604/cmc.2026.074678
Received 15 October 2025; Accepted 26 December 2025; Issue published 08 May 2026
Abstract
Non-terrestrial networks (NTNs), encompassing unmanned aerial vehicles (UAVs), low-/high-altitude platforms (LAPs/HAPs), and satellite systems, are increasingly enabling Internet of Things (IoT) applications beyond the limits of terrestrial infrastructure. By combining UAV mobility with satellite and HAP coverage, NTN-assisted IoT supports diverse use cases, including remote sensing, smart cities, intelligent transportation, and emergency response. This paper presents a systematic mapping of machine learning (ML) research in NTN-assisted IoT with a focus on security-related aspects. A keyword co-occurrence analysis of over 2000 publications identifies twelve thematic clusters, including three clusters directly related to security, privacy, and trust. Cluster interconnections are analyzed to reveal dominant research trends and technological dependencies. The first security-focused cluster addresses access control, authentication, privacy preservation, and ML-based intrusion detection in Internet of Drones (IoD) and satellite-enabled systems, while also highlighting feature selection and energy-aware design. The second cluster centers on edge computing-enabled localization and privacy, linking technologies such as GPS, RSSI, LoRaWAN, and differential privacy for smart-city deployments. The third cluster emphasizes blockchain-enabled trust mechanisms, integrating blockchain with aerial image classification, intrusion detection, and secure coordination in IoD environments. Using a connectivity-driven analysis, anchor keywords with strong intra-cluster associations are identified and discussed alongside representative literature. Finally, emerging low-frequency themes are used to outline future directions, including AI-enabled security, trustworthy edge intelligence, autonomous and resilient robotic systems, predictive cyber resilience, and secure cognitive communication for next-generation NTN-assisted IoT.Keywords
Cite This Article
Copyright © 2026 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools