Reutov, Moscow, Russian Federation
The article analyzes the impact of Internet of Things technologies on the information security of networks. The study examines traditional and extended multi-level IoT security architectures, the main threats distributed across architectural levels, as well as new types of threats targeting artificial intelligence components. A review of the scientific literature highlights the high relevance of the problem in the context of the rapid growth in the number of connected devices and their limited resources. In this regard, practical recommendations for risk mitigation are proposed, including the use of lightweight cryptography, blockchain technologies, multi-level security based on the security-by-design principle, and compliance with regulatory requirements. Special attention is paid to mathematical modeling of risks and the effectiveness of protection mechanisms for resource-constrained IoT systems.
Internet of Things, information security, cyber threats, architecture, risk assessment
1. S. Saravana Kumar, Balaji Kannan, "Enhancing Industrial IoT Security with AI and Cloud Computing: A Review of Threats and Solutions", 2025 International Conference on Modern Sustainable Systems (CMSS), pp.1082-1089, 2025.
2. DDoS-ataki v 2025 godu: cifry, trendy, analitika // StormWall. – 2026. – 23 yanvarya. – URL: https://stormwall.pro/resources/blog/ddos-trendy-2025 (data obrascheniya: 09.03.2026).
3. 12 urovney IIoT-arhitektury: ot periferiynyh datchikov do analitiki Big Data // BigDataSchool. – 2019. – 10 noyabrya. – URL: https://bigdataschool.ru/blog/iiot-architecture-levels-and-tools/ (data obrascheniya: 07.04.2026).
4. Ataki na Android i IoT vyrosli v neskol'ko raz v 2025 godu // SecPost. – 2025. – 6 noyabrya. – URL: https://secpost.ru/mobilnye-i-iot-ugrozy-2025-42-milliona-skachivanij-vredonosov-i-rost-atak-na-promyshlennost (data obrascheniya: 05.04.2026).
5. Emerging Threats & Vulnerabilities to Prepare for in 2025 // Dark Reading. – 2024. – 26 dekabrya. – URL: https://www.darkreading.com/vulnerabilities-threats/emerging-threats-vulnerabilities-prepare-2025 (data obrascheniya: 30.03.2026).
6. NIST utverdil standart bystroy kriptografii Ascon dlya zaschity IoT-ustroystv // Anti-Malware.ru. – 2025. – 15 avgusta. – URL: https://www.anti-malware.ru/news/2025-08-15-111332/47003 (data obrascheniya: 25.03.2026).
7. Asma Lahbib, Khalifa Toumi, Anis Laouiti, Steven Martin. Blockchain based distributed trust management in IoT and IIoT: a survey. Journal of Supercomputing, 2024, 80 (15), pp.21867-21919. DOI: https://doi.org/10.1007/s11227-024-06286-4
8. Cyber Resilience Act // European Commission. Shaping Europe’s digital future. – 2025. – URL: https://digital-strategy.ec.europa.eu/en/policies/cyber-resilience-act (data obrascheniya: 10.04.2026).



