AI vs. AI in IoT Security: A Systematic Review of Autonomous Exploits and Defense Mechanisms

Authors

  • MNS. Rajeev Bhargava Research Scholar, Trine University, Michigan, United States Author

DOI:

https://doi.org/10.70162/mijarcse/2026/v12/i1/v12i101

Keywords:

Artificial Intelligence, Internet of Things, Cybersecurity, AI-driven Intrusion Detection Systems, Deep Learning, Convolutional Neural Networks, Recurrent Neural Networks, Autoencoders, Adversarial Machine Learning, Reinforcement Learning, Generative Adversarial Networks

Abstract

Artificial intelligence (AI) empowered defense systems have evolved as a unique response to cyber security challenges occurring in the Internet of Things (IoT) as conventional security measures are ineffective against autonomous and adaptive threat manifestations. The paper studies the association between AI-driven offensive and defensive methods for protecting smart equipment within the AI vs AI concept. This includes systematic review aligned with PRISMA insights implemented with peer-reviews from databases including Scopus, Web of Science, IEEE Xplore, and ScienceDirect. The study involved generation of the ultimate sample of n=62 domain-based studies and it highlights the urgent requirement to develop a scalable, adaptive and strong AI framework with capabilities to manage emerging challenges of IoT security. Future research needs to emphasize on improving generalized models for reducing false positives and unifying lighter AI solutions for resource limited devices

References

Q. A. Al-Haija and S. A. Tamimi, “A State-of-the-Art Survey of Adversarial Reinforcement Learning for IoT Intrusion Detection,” Computers, Materials & Continua, vol. 87, no. 1, pp. 1–10, 2026, doi: 10.32604/cmc.2025.073540.

M. Almiani, A. AbuGhazleh, A. Al-Rahayfeh, S. Atiewi, and A. Razaque, “Deep recurrent neural network for IoT intrusion detection system,” Simulation Modelling Practice and Theory, vol. 101, p. 102031, May 2020, doi: 10.1016/j.simpat.2019.102031.

B. Alotaibi, “A Survey on Industrial Internet of Things Security: Requirements, Attacks, AI-Based Solutions, and Edge Computing Opportunities,” Sensors, vol. 23, no. 17, p. 7470, Aug. 2023, doi: 10.3390/s23177470.

A. Alourani, M. Alam, A. Ali, I. R. Khan, and C. K. Samal, “Hybrid AI-IoT Framework with Digital Twin Integration for Predictive Urban Infrastructure Management in Smart Cities,” Computers, Materials & Continua, vol. 86, no. 1, pp. 1–32, 2026, doi: 10.32604/cmc.2025.070161.

U. E. Chigbu, S. O. Atiku, and C. C. Du Plessis, “The Science of Literature Reviews: Searching, Identifying, Selecting, and Synthesising,” Publications, vol. 11, no. 1, p. 2, Jan. 2023, doi: 10.3390/publications11010002.

F. Hussain, R. Hussain, S. A. Hassan, and E. Hossain, “Machine Learning in IoT Security: Current Solutions and Future Challenges,” IEEE Communications Surveys & Tutorials, vol. 22, no. 3, pp. 1686–1721, 2020, doi: 10.1109/comst.2020.2986444.

Sridevi Kakolu, Muhammad Ashraf Faheem, and Muhammad Aslam, “AI-enabled intrusion detection systems in IoT networks: Advancing defense mechanisms for resource-constrained devices,” International Journal of Science and Research Archive, vol. 9, no. 1, pp. 752–769, Jun. 2023, doi: 10.30574/ijsra.2023.9.1.0316.

B. R. Kikissagbe and M. Adda, “Machine Learning-Based Intrusion Detection Methods in IoT Systems: A Comprehensive Review,” Electronics, vol. 13, no. 18, p. 3601, Sep. 2024, doi: 10.3390/electronics13183601.

T. Li, A. K. Sahu, A. Talwalkar, and V. Smith, “Federated Learning: Challenges, Methods, and Future Directions,” IEEE Signal Processing Magazine, vol. 37, no. 3, pp. 50–60, May 2020, doi: 10.1109/msp.2020.2975749.

D. Moher, A. Liberati, J. Tetzlaff, and D. G. Altman, “Preferred reporting items for systematic reviews and meta-analyses: The PRISMA statement,” International Journal of Surgery, vol. 8, no. 5, pp. 336–341, 2010, doi: 10.1016/j.ijsu.2010.02.007.

C. Alioanei and N. Popescu, “AI-Based Solutions for Security and Resource Optimization in IoT Environments: A Systematic Review,” Information, vol. 16, no. 10, p. 841, Sep. 2025, doi: 10.3390/info16100841.

A. A. Selcuk, “A Guide for Systematic Reviews: PRISMA,” Turkish Archives of Otorhinolaryngology, vol. 57, no. 1, pp. 57–58, May 2019, doi: 10.5152/tao.2019.4058.

C. Zhang, X. Costa-Perez, and P. Patras, “Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms,” IEEE/ACM Transactions on Networking, vol. 30, no. 3, pp. 1294–1311, Jun. 2022, doi: 10.1109/tnet.2021.3137084.

Downloads

Published

2026-04-13

Issue

Section

Review Papers

How to Cite

[1]
MNS. Rajeev Bhargava, “AI vs. AI in IoT Security: A Systematic Review of Autonomous Exploits and Defense Mechanisms”, Macaw Int. J. Adv. Res. Comput. Sci. Eng, vol. 12, no. 1, pp. 1–7, Apr. 2026, doi: 10.70162/mijarcse/2026/v12/i1/v12i101.

Share