Transforming IoT Security through Large Language Models: A Comprehensive Systematic Review and Future Directions
Keywords:
Large Language Models; Internet of Things Security; Systematic Review; Statistical Security Analysis; Optimization Methods; Resource Efficiency; Security Architecture; Privacy Preservation
Abstract
The rapid integration of Large Language Models (LLMs) in Internet of Things (IoT) security presents both unprecedented opportunities and complex challenges. This systematic literature review examines 34 recent studies (2022-2024) to evaluate the effectiveness, challenges, and architectural innovations of LLM implementations in IoT security environments. Through a rigorous methodology following PRISMA guidelines, we analyze performance metrics, implementation strategies, and resource optimization approaches across diverse security applications. Our findings reveal significant advancements in detection capabilities, with frameworks like SecurityBERT achieving 98.2% accuracy while reducing model size by 89.85%, and privacy-preservation mechanisms demonstrating up to 98.247% protection effectiveness. However, persistent challenges emerge in resource optimization, real-time processing requirements, and cross-platform compatibility. The review identifies critical research gaps in standardization frameworks, ultra-constrained device optimization, and privacy-preserving architectures. Our analysis reveals promising architectural innovations, including hybrid deployment strategies reducing energy consumption by 45% and federated learning approaches achieving 97.12% accuracy while maintaining data privacy. This comprehensive review provides a foundation for future research directions in LLM-based IoT security, emphasizing the need for balanced approaches between security effectiveness and resource constraints. The findings suggest that successful implementation requires careful consideration of computational requirements, privacy preservation, and architectural optimization for resource-constrained environments
Published
2025-07-13
How to Cite
Tawfik, M., Abdelhaliem, A. H., & Fathi, I. S. (2025). Transforming IoT Security through Large Language Models: A Comprehensive Systematic Review and Future Directions. Statistics, Optimization & Information Computing. https://doi.org/10.19139/soic-2310-5070-2424
Issue
Section
Research Articles
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).