The Internet of Things (IoT) has revolutionized communication among devices, offering unprecedented efficiency and convenience. However, the widespread adoption of IoT has raised significant security concerns, emphasizing the need for robust security measures. This study focuses on the crucial aspect of authentication within the layered architecture of IoT systems. Authentication is foundational to the architecture, ensuring the availability, security, and integrity of IoT services and data. The research evaluates the current state of IoT authentication techniques, highlighting limitations in conventional solutions. To address these shortcomings, an advanced authentication framework is proposed, incorporating cutting-edge technologies such as blockchain, artificial intelligence, and biometrics. The framework employs biometric data for a dynamic and adaptive authentication process, enhancing security and accuracy in user and device identification. Blockchain technology is integrated to establish a decentralized and tamper-resistant identity management system, reducing the risk of unauthorized access and data manipulation. Artificial intelligence continuously adapts authentication processes based on behavioural patterns, bolstering the system's resilience against evolving cyber threats. The study also discusses the practical application of the proposed authentication system, considering resource limitations in IoT devices. It provides insights into the efficiency, scalability, and interoperability of the suggested solution within various IoT ecosystems. The research contributes to the ongoing discourse on IoT security by thoroughly examining enhanced authentication procedures. Organizations can fortify their IoT deployments against a growing array of cyber threats by prioritizing advanced authentication within a layered design, fostering a more secure and reliable IoT ecosystem. Additionally, the study presents a comprehensive overview of the state-of-the-art security in IoT, exploring various designs, enabling technologies, and protocols. It delves into security challenges at each architectural tier, providing an in-depth analysis of attack taxonomies and advanced defenses. The article serves as a valuable resource for researchers and academics in the IoT sector, offering a detailed survey of architectural security, identification of challenges, resolution strategies, and insights into the evolving landscape of IoT. The study provides a comprehensive survey of IoT architectural security, identifying challenges, proposing resolutions, and highlighting changes in the IoT domain. This research aims to enhance the accuracy by 80% of IoT security, fostering a more secure and reliable IoT ecosystem.