Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

The Next Frontier of IoT Security: Real-Time Phishing Defense Powered by Edge AI

View through CrossRef
The rapid and substantial proliferation of Internet of Things (IoT) devices has facilitated the integration of artificial intelligence (AI) with edge computing, enabling intelligent, decentralized data processing to enable various applications. This study critically evaluates the advancements in AI-driven edge computing inside IoT ecosystems from 2020 to 2025, concentrating on phishing detection and mitigation. We examine peer-reviewed literature to assess not only cutting-edge AI technologies, including deep learning, federated learning, and reinforcement learning, but also architectural innovations pertinent to smart cities, healthcare, and industrial IoT. The advancements provide real-time data mining, high scalability, and energy-efficient system functionality, significantly enhancing the performance of IoT systems. It is noteworthy that edge AI can function as a facilitator for an effective phishing detector, enabling the identification and mitigation of threats locally and promptly, which is crucial for maintaining a secure IoT network in highly sensitive environments. Nevertheless, concerns such as security vulnerabilities, interoperability issues, poor latency, and limited resources characterize edge devices. The evaluation highlights the lack of standardized criteria for AI model implementation and insufficient defensive measures against sophisticated phishing attacks. The gaps hinder seamless integration and scalability in heterogeneous IoT systems. We propose future research avenues focused on developing adaptive AI models for a dynamic threat landscape, establishing standardized interoperability, and creating lightweight cryptographic solutions tailored for resource-constrained devices. The paper provides a comprehensive synthesis of existing situations, opportunities, and difficulties, offering research and practical insights to enhance the security and efficiency of AI-based edge computing in IoT applications. By addressing these problems, it is feasible to harness the complete potential of AI at the edge and transform IoT ecosystems into intelligent, resilient cyber networks capable of mitigating emerging cyber threats, including phishing.
Title: The Next Frontier of IoT Security: Real-Time Phishing Defense Powered by Edge AI
Description:
The rapid and substantial proliferation of Internet of Things (IoT) devices has facilitated the integration of artificial intelligence (AI) with edge computing, enabling intelligent, decentralized data processing to enable various applications.
This study critically evaluates the advancements in AI-driven edge computing inside IoT ecosystems from 2020 to 2025, concentrating on phishing detection and mitigation.
We examine peer-reviewed literature to assess not only cutting-edge AI technologies, including deep learning, federated learning, and reinforcement learning, but also architectural innovations pertinent to smart cities, healthcare, and industrial IoT.
The advancements provide real-time data mining, high scalability, and energy-efficient system functionality, significantly enhancing the performance of IoT systems.
It is noteworthy that edge AI can function as a facilitator for an effective phishing detector, enabling the identification and mitigation of threats locally and promptly, which is crucial for maintaining a secure IoT network in highly sensitive environments.
Nevertheless, concerns such as security vulnerabilities, interoperability issues, poor latency, and limited resources characterize edge devices.
The evaluation highlights the lack of standardized criteria for AI model implementation and insufficient defensive measures against sophisticated phishing attacks.
The gaps hinder seamless integration and scalability in heterogeneous IoT systems.
We propose future research avenues focused on developing adaptive AI models for a dynamic threat landscape, establishing standardized interoperability, and creating lightweight cryptographic solutions tailored for resource-constrained devices.
The paper provides a comprehensive synthesis of existing situations, opportunities, and difficulties, offering research and practical insights to enhance the security and efficiency of AI-based edge computing in IoT applications.
By addressing these problems, it is feasible to harness the complete potential of AI at the edge and transform IoT ecosystems into intelligent, resilient cyber networks capable of mitigating emerging cyber threats, including phishing.

Related Results

Phishing Cyber Security Threats
Phishing Cyber Security Threats
Phishing is a growing threat in the realm of cybersecurity, where cybercriminals use various phishing techniques to steal sensitive information from individuals and organizations. ...
The need for education on phishing: a survey comparison of the UK and Qatar
The need for education on phishing: a survey comparison of the UK and Qatar
PurposeThis paper seeks to focus on identifying the need for education to enhance awareness of the e‐mail phishing threat as the most effective way to reduce the risk of e‐mail phi...
Deep Learning Based Phishing Websites Detection
Deep Learning Based Phishing Websites Detection
Phishing is a crime that involves the theft of confidential user information. Those targeted by phishing websites include individuals, small businesses, cloud storage providers, an...
Identification of Phishing Urls Using Machine Learning
Identification of Phishing Urls Using Machine Learning
Abstract Phishing is a typical assault on unsuspecting individuals by making them to reveal their one-of-a-kind data utilizing fake sites. The target of phishing sit...
Magic graphs
Magic graphs
DE LA TESIS<br/>Si un graf G admet un etiquetament super edge magic, aleshores G es diu que és un graf super edge màgic. La tesis està principalment enfocada a l'estudi del c...
AI-Based Phishing Attack Detection And Prevention Using Natural Language Processing (NLP)
AI-Based Phishing Attack Detection And Prevention Using Natural Language Processing (NLP)
Phishing attacks remain one of the most prevalent and damaging cybersecurity threats, targeting users across various communication channels such as email, social media, and SMS. Tr...
Emerging Trends in Phishing : A look at Smishing, Vishing and Quishing
Emerging Trends in Phishing : A look at Smishing, Vishing and Quishing
Sophisticated and varied approaches including Smishing (SMS phishing), vishing (voice phishing), and quishing (QR code phishing) have emerged as a result of phishing attacks' major...
Impact of Phishing Attack on Business
Impact of Phishing Attack on Business
Phishing attacks are a major threat to business, using tricks to manipulate employees into giving away sensitive information. This chapter explores how phishing attacks impact busi...

Back to Top