A Comprehensive Review of Telemetry Data-Driven AI Cybersecurity Solutions in IoT-Based Insurance Ecosystems

Authors

  • Subhojit Ghosh Independent Researcher. Author
  • Srinivas Dadi Independent Researcher Author

DOI:

https://doi.org/10.63282/3050-922X.IJERET-V6I3P112

Keywords:

Internet of Things (IoT), Telemetry Data, Artificial Intelligence (AI), Cybersecurity, Insurance, Predictive Underwriting, Fraud Detection

Abstract

The Internet of Things (IoT), artificial intelligence (AI), and telematics are all contributing to the digitization of the insurance industry. Because of the Internet of Things' (IoT) explosive growth, insurance systems are now able to collect data in real time from linked devices like wearables, cars, and industrial sensors. While this connectivity enhances risk assessment, claims processing, and operational efficiency, it also introduces significant cybersecurity and privacy challenges. Improving cybersecurity in insurance ecosystems based on the IoT is the focus of this article, which offers a thorough analysis of AI solutions powered by telemetry. Discuss normal and adversarial scenarios in Industrial IoT environments, including scanning, denial-of-service, ransomware, backdoor, and injection attacks, and highlight the role of AI in automated threat detection, anomaly identification, and real-time mitigation. Furthermore, the paper examines AI applications in predictive underwriting, fraud detection, and usage-based insurance, alongside key challenges such as data privacy, legacy system integration, ethical concerns, and regulatory compliance. Finally, future directions, including privacy-preserving AI, Explainable AI, blockchain integration, and edge intelligence, are outlined to foster secure, transparent, and scalable adoption of AI in insurance. The study highlights the crucial role of telemetry-driven AI in developing resilient, equitable, and trustworthy insurance ecosystems

References

[1] N. U. Prince et al., “AI-Powered Data-Driven Cybersecurity Techniques: Boosting Threat Identification and Reaction,” 2024. doi: 10.13140/RG.2.2.22975.52644.

[2] V. Verma, “Security Compliance and Risk Management in AI-Driven Financial Transactions,” Int. J. Eng. Sci. Math., vol. 12, no. 7, pp. 107–121, 2023.

[3] D. Patel, “Enhancing Banking Security: A Blockchain and Machine Learning- Based Fraud Prevention Model,” Int. J. Curr. Eng. Technol., vol. 13, no. 06, pp. 576–583, Dec. 2023, doi: 10.14741/ijcet/v.13.6.10.

[4] R. Patel, “Automated Threat Detection and Risk Mitigation for ICS (Industrial Control Systems) Employing Deep Learning in Cybersecurity Defence,” Int. J. Curr. Eng. Technol., vol. 13, no. 06, pp. 584–591, Dec. 2023, doi: 10.14741/ijcet/v.13.6.11.

[5] P. Radanliev, D. De Roure, C. Maple, J. R. C. Nurse, R. Nicolescu, and U. Ani, “AI security and cyber risk in IoT systems,” Front. Big Data, vol. 7, Oct. 2024, doi: 10.3389/fdata.2024.1402745.

[6] R. Q. Majumder, “A Review of Anomaly Identification in Finance Frauds Using Machine Learning Systems,” Int. J. Adv. Res. Sci. Commun. Technol., pp. 101–110, Apr. 2025, doi: 10.48175/IJARSCT-25619.

[7] D. D. Rao, A. A. Waoo, M. P. Singh, P. K. Pareek, S. Kamal, and S. V. Pandit, “Strategizing IoT Network Layer Security Through Advanced Intrusion Detection Systems and AI-Driven Threat Analysis,” J. Intell. Syst. Internet Things, vol. 24, no. 2, pp. 195–207, 2024, doi: 10.54216/JISIoT.120215.

[8] R. Patel, “Artificial Intelligence-Powered Optimization of Industrial IoT Networks Using Python-Based Machine Learning,” J. Eng. Technol. Adv., vol. 3, no. 4, pp. 138–148, 2023, doi: 10.56472/25832646/JETA-V3I8P116.

[9] D. Patel, “Leveraging Blockchain and AI Framework for Enhancing Intrusion Prevention and Detection in Cybersecurity,” Tech. Int. J. Eng. Res., vol. 10, no. 6, pp. 853–858, 2023, doi: 10.56975/tijer.v10i6.158517.

[10] K. Sutariya and K. K. Pramanik, “Managing IoT Cyber-Security Using Programmable Telemetry and Machine Learning,” in 2023 International Conference on Artificial Intelligence and Smart Communication (AISC), IEEE, Jan. 2023, pp. 1323–1328. doi: 10.1109/AISC56616.2023.10085343.

[11] R. Q. Majumder, “Machine Learning for Predictive Analytics: Trends and Future Directions,” Int. J. Innov. Sci. Res. Technol., vol. 10, no. 4, pp. 3557–3564, May 2025, doi: 10.38124/ijisrt/25apr1899.

[12] V. Shah, “Analyzing Traffic Behavior in IoT-Cloud Systems: A Review of Analytical Frameworks,” Int. J. Sci. Res. Comput. Sci. Eng. InfoShah, V. ‘Analyzing Traffic Behav. IoT-Cloud Syst. A Rev. Anal. Fram. Int. J. Sci. Res. Comput. Sci. E, vol. 9, no. 3, pp. 877–885, 2023, doi: 10.32628/IJSRCSEIT.

[13] A. Adewuyi et al., “The convergence of cybersecurity, Internet of Things (IoT), and data analytics: Safeguarding smart ecosystems,” World J. Adv. Res. Rev., vol. 23, no. 1, pp. 379–394, Jul. 2024, doi: 10.30574/wjarr.2024.23.1.1993.

[14] A. Alsaedi, N. Moustafa, Z. Tari, A. Mahmood, and A. Anwar, “TON_IoT Telemetry Dataset: A New Generation Dataset of IoT and IIoT for Data-Driven Intrusion Detection Systems,” IEEE Access, vol. 8, pp. 165130–165150, 2020, doi: 10.1109/ACCESS.2020.3022862.

[15] S. B. Shah, “Machine Learning for Cyber Threat Detection and Prevention in Critical Infrastructure,” Dep. Oper. Bus. Anal. Inf. Syst. (OBAIS, vol. 2, no. 2, pp. 1–7, 2025, doi: 10.5281/zenodo.14955016.

[16] R. Abreu, E. Simão, C. Serôdio, F. Branco, and A. Valente, “Enhancing IoT Security in Vehicles: A Comprehensive Review of AI-Driven Solutions for Cyber-Threat Detection,” AI, vol. 5, no. 4, pp. 2279–2299, Nov. 2024, doi: 10.3390/ai5040112.

[17] V. K. Tarra, “Telematics & IoT-Driven Insurance with AI in Salesforce,” Int. J. AI, BigData, Comput. Manag. Stud., vol. 5, no. 3, pp. 72–80, 2024, doi: 10.63282/3050-9416.IJAIBDCMS-V5I3P108.

[18] G. Mantha, “Transforming the Insurance Industry with Salesforce: Enhancing Customer Engagement and Operational Efficiency,” North Am. J. Eng. Res., vol. 5, no. 3, 2024.

[19] B. V. Swamy, P. P. Barmola, S. Thangavel, S. Kaliappan, H. Patel, and G. Abhyankar, “Cognitive Twins for Predictive Maintenance and Security in IoT Software Systems,” in 2024 4th International Conference on Mobile Networks and Wireless Communications (ICMNWC), IEEE, Dec. 2024, pp. 1–8. doi: 10.1109/ICMNWC63764.2024.10872082.

[20] S. S. S. Neeli, “Critical Cybersecurity Strategies for Database Protection Against Cyber Attacks,” J. Artif. Intell. Mach. Learn. Data Sci., vol. 1, no. 1, pp. 2102–2106, Nov. 2022, doi: 10.51219/JAIMLD/sethu-sesha-synam-neeli/461.

[21] S. Haque, F. El-Moussa, N. Komninos, and R. Muttukrishnan, “A Systematic Review of Data-Driven Attack Detection Trends in IoT,” 2023. doi: 10.3390/s23167191.

[22] J. Mishra, B. B. Biswal, and N. Padhy, “Machine Learning for Fraud Detection in Banking Cyber security Performance Evaluation of Classifiers and Their Real-Time Scalability,” in 2025 International Conference on Emerging Systems and Intelligent Computing (ESIC), IEEE, Feb. 2025, pp. 431–436. doi: 10.1109/ESIC64052.2025.10962752.

[23] A. R. Bilipelli, “Forecasting the Evolution of Cyber Attacks in FinTech Using Transformer-Based Time Series Models,” Int. J. Res. Anal. Rev., vol. 10, no. 3, pp. 383–389, 2023.

[24] V. Prajapati, “Enhancing Threat Intelligence and Cyber Defense through Big Data Analytics: A Review Study,” J. Glob. Res. Math. Arch., vol. 12, no. 4, pp. 1–6, 2025.

[25] V. Shah, “Traffic Intelligence in IoT and Cloud Networks: Tools for Monitoring, Security, and Optimization,” Int. J. Recent Technol. Sci. Manag., vol. 9, no. 5, 2024.

[26] S. Thangavel, “AI Enhanced Image Processing System For Cyber Security Threat Analysis,” 2024

[27] A. H. Salem, S. M. Azzam, O. E. Emam, and A. A. Abohany, “Advancing cybersecurity: a comprehensive review of AI-driven detection techniques,” J. Big Data, vol. 11, no. 1, p. 105, Aug. 2024, doi: 10.1186/s40537-024-00957-y.

[28] N. K. Prajapati, “Federated Learning for Privacy-Preserving Cybersecurity: A Review on Secure Threat Detection,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 5, no. 4, pp. 520–528, Apr. 2025, doi: 10.48175/IJARSCT-25168.

[29] S. Pandya, “A Machine and Deep Learning Framework for Robust Health Insurance Fraud Detection and Prevention,” Int. J. Adv. Res. Sci. Commun. Technol., vol. 3, no. 3, pp. 1332–1342, Jul. 2023, doi: 10.48175/IJARSCT-14000U.

[30] S. Narang and A. Gogineni, “Zero-Trust Security in Intrusion Detection Networks: An AI-Powered Threat Detection in Cloud Environment,” Int. J. Sci. Res. Mod. Technol., vol. 4, no. 5, pp. 60–70, Jun. 2025, doi: 10.38124/ijsrmt.v4i5.542.

[31] H. Kali, “Optimizing Credit Card Fraud Transactions identification and classification in banking industry Using Machine Learning Algorithms,” Int. J. Recent Technol. Sci. Manag., vol. 9, no. 11, pp. 85–96, 2024.

[32] S. Bhattacharya, G. Castignani, L. Masello, and B. Sheehan, “AI revolution in insurance: bridging research and reality,” Front. Artif. Intell., vol. 8, Apr. 2025, doi: 10.3389/frai.2025.1568266.

[33] V. Verma, “Deep Learning-Based Fraud Detection in Financial Transactions : A Case Study Using Real-Time Data Streams,” ESP J. Eng. Technol. Adv., vol. 3, no. 4, pp. 149–157, 2023, doi: 10.56472/25832646/JETA-V3I8P117.

[34] H. Kapadia and K. C. Chittoor, “Quantum Computing Threats to Web Encryption in Banking,” Int. J. Nov. Trends Innov., vol. 2, no. 12, pp. a197–a204, 2024.

[35] I. Jada and T. O. Mayayise, “The impact of artificial intelligence on organisational cyber security: An outcome of a systematic literature review,” Data Inf. Manag., vol. 8, no. 2, p. 100063, Jun. 2023, doi: 10.1016/j.dim.2023.100063.

[36] H. Kali and G. Modalavalasa, “Artificial Intelligence (AI)-Driven Business Intelligence for Enhancing Retail Performance with Customer Insights,” Asian J. Comput. Sci. Eng., vol. 9, no. 4, pp. 1–9, 2024, doi: 10.22377/ajcse.v10i2.210.

[37] N. Malali, “Exploring Artificial Intelligence Models for Early Warning Systems with Systemic Risk Analysis in Finance,” in 2025 International Conference on Advanced Computing Technologies (ICoACT), IEEE, Mar. 2025, pp. 1–6. doi: 10.1109/ICoACT63339.2025.11005357.

[38] J. Paul, “AI-Powered Data Analytics: Shaping the Future of Auto Insurance Pricing and Claims Processing,” 2024.

[39] H. P. Kapadia and K. B. Thakkar, “Generative AI for Real-Time Customer Support Content Creation,” J. Emerg. Technol. Innov. Res., vol. 10, no. 12, pp. i36–i43, 2023.

[40] A. Paragioudakis, M. Smyrlis, and G. Spanoudakis, “ERMIS: A Cybersecurity Market for Assurance and Insurance-as-a-Service,” in 2025 IEEE International Conference on Cyber Security and Resilience (CSR), IEEE, Aug. 2025, pp. 765–770. doi: 10.1109/CSR64739.2025.11130152.

[41] A. A. Sunna, T. Sultana, N. Kshetri, and M. M. Uddin, “AssessCICA: Assessing and Mitigating Financial Losses from Cyber Attacks with Role of Cyber Insurance in Post-Pandemic Era,” in 2025 13th International Symposium on Digital Forensics and Security (ISDFS), 2025, pp. 1–6. doi: 10.1109/ISDFS65363.2025.11012092.

[42] S. Jawhar, C. E. Kimble, J. R. Miller, and Z. Bitar, “Enhancing Cyber Resilience with AI-Powered Cyber Insurance Risk Assessment,” in 2024 IEEE 14th Annual Computing and Communication Workshop and Conference (CCWC), IEEE, Jan. 2024, pp. 0435–0438. doi: 10.1109/CCWC60891.2024.10427965.

[43] A. Patil and S. Patil, “IoT Enabled Vehicle Monitoring and Theft Prevention System (I-VMTPS),” in 2024 2nd International Conference on Advancements and Key Challenges in Green Energy and Computing (AKGEC), IEEE, Nov. 2024, pp. 1–7. doi: 10.1109/AKGEC62572.2024.10869260.

[44] J. Yang, L. Liang, and J. Qi, “A Practical Non-Intrusive Cyber Security Vulnerability Assessment Method for Cyber-Insurance,” in 2023 8th International Conference on Data Science in Cyberspace (DSC), IEEE, Aug. 2023, pp. 261–269. doi: 10.1109/DSC59305.2023.00045.

[45] S. Y, N. Victor, G. Srivastava, and T. R. Gadekallu, “A Hybrid Federated Learning Model for Insurance Fraud Detection,” in 2023 IEEE International Conference on Communications Workshops (ICC Workshops), IEEE, May 2023, pp. 1516–1522. doi: 10.1109/ICCWorkshops57953.2023.10283682.

[46] C. Min, D. Zhao, and H. Lu, “The Processing Method of the Message Based on the In-band Network Telemetry Technology,” in 2022 International Conference on Service Science (ICSS), IEEE, May 2022, pp. 21–24. doi: 10.1109/ICSS55994.2022.00013.

Downloads

Published

2025-09-04

Issue

Section

Articles

How to Cite

1.
Ghosh S, Dadi S. A Comprehensive Review of Telemetry Data-Driven AI Cybersecurity Solutions in IoT-Based Insurance Ecosystems. IJERET [Internet]. 2025 Sep. 4 [cited 2025 Oct. 10];6(3):103-12. Available from: https://ijeret.org/index.php/ijeret/article/view/294