Abstract
The Internet of Things (IoT) is increasingly integrated into modern software-driven systems across consumer, industrial, and healthcare domains. The heterogeneity of IoT devices, combined with their resource constraints, often renders conventional software security mechanisms insufficient, exposing systems to breaches and exploitation. This study examines recent IoT security incidents to illustrate common vulnerabilities in software-intensive IoT ecosystems, highlighting the resulting risks to critical applications. In response, we review emerging machine learning (ML)-driven security modules and deep learning (DL)-based intrusion detection software, positioning them as adaptive components that can be integrated into IoT system architectures. This review highlights recent peer-reviewed contributions, ensuring alignment with the most current developments in IoT security using ML and DL, and follows a systematic review methodology based on IEEE Xplore (2020--2024). The study further identifies software engineering challenges in integrating these intelligent modules into resource-constrained IoT environments and outlines future directions for building secure-by-design, AI-driven IoT software frameworks. Results demonstrate that ML- and DL-enhanced security modules strengthen software resilience by enabling real-time detection of cyber-attacks, reducing false alarms, and adapting to evolving threat landscapes. The review is structured to first discuss notable case studies of IoT security breaches, followed by an analysis of ML- and DL-based security modules, a comparative evaluation of their effectiveness, and finally, a discussion of key challenges and future research opportunities.
Keywords
internet of things (IoT)
cybersecurity
machine learning (ML)
deep learning (DL)
intrusion detection system (IDS)
anomaly detection
IoT security
adversarial attacks
Data Availability Statement
Not applicable.
Funding
This work was supported without any funding.
Conflicts of Interest
The authors declare no conflicts of interest.
Ethical Approval and Consent to Participate
Not applicable.
Cite This Article
APA Style
Arif, H., Ali, A. K. S., & Nabi, H. A. (2025). IoT Security through ML/DL: Software Engineering Challenges and Directions. ICCK Journal of Software Engineering, 1(2), 90–108. https://doi.org/10.62762/JSE.2025.372865
Publisher's Note
ICCK stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and Permissions

Copyright © 2025 by the Author(s). Published by Institute of Central Computation and Knowledge. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (
https://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.