Internet of Things

Papers
(The H4-Index of Internet of Things is 57. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
A semantic communication model for the task of high quality image transmission to edge-end devices553
E-governance and the European Union: Agenda for implementation441
A real-time tennis level evaluation and strokes classification system based on the Internet of Things267
A cost-effective LoRaWAN-based IoT localization method using fixed reference nodes and dual-slope path-loss modeling205
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario169
TUI Model for data privacy assessment in IoT networks144
Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things134
Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors127
A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices125
Building structural analysis based Internet of Things network assisted earthquake detection117
Task offloading scheme of vehicular cloud edge computing based on Digital Twin and improved A3C112
Multifactor QoE scores in IoT topologies110
Optimal data transmission for decentralized IoT and WSN based on Type-2 Fuzzy Harris Hawks Optimization110
Empowering smart cities: High-altitude platforms based Mobile Edge Computing and Wireless Power Transfer for efficient IoT data processing106
Federated learning for performance behavior detection in a fog-IoT system100
CSFF-YOLOv5: Improved YOLOv5 based on channel split and feature fusion in femoral neck fracture detection99
SPOTTER: A novel asynchronous and independent WiFi and BLE fusion method based on particle filter for indoor positioning99
Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications99
Dfinder—An efficient differencing algorithm for incremental programming of constrained IoT devices99
Proactive trust classification for detection of replication attacks in 6LoWPAN-based IoT94
A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain93
Constructing a Network Digital Twin through formal modeling: Tackling the virtual–real mapping challenge in IIoT networks86
IoT convergence with machine learning & blockchain: A review86
MDP-based connectivity and availability models for Internet of Vehicles84
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices83
IoT-based supply chain management: A systematic literature review82
Securing IoT devices: A novel approach using blockchain and quantum cryptography82
An IoT-enabled omnidirectional mobile system for home-based rehabilitation of upper and lower limbs82
A cellular learning automata-based approach for self-protection and coverage problem in the Internet of Things80
Outlier detection in non-stationary time series applied to sewer network monitoring80
Autonomous driving test system under hybrid reality: The role of digital twin technology78
A formal approach to specify and verify Internet of Things architecture77
A flexible Compilation-as-a-Service and Remote-Programming-as-a-Service platform for IoT devices75
EVACUSCAPE: Internet of Things-enabled emergency evacuation based on matching theory74
Sensors as the Basis for Digitalization: New Approaches in Instrumentation, IoT-concepts, and 5G73
CONCERN: A model-based monitoring infrastructure73
An energy-focused model for batteryless IoT: Vortex wireless power transfer and fog computing in 6 G networks71
Deep learning-based transceiver design for multi-user MIMO systems70
Front matter 2 - Editorial board68
A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer68
Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats67
Algorithm and hardware co-design co-optimization framework for LSTM accelerator using quantized fully decomposed tensor train63
Anomaly-based Intrusion Detection System for smart lighting62
Capability token selection algorithms to implement lightweight protocols62
SkinSense: Efficient vibration-based communications over human body using motion sensors61
A contactless method for recognition of daily living activities for older adults based on ambient assisted living technology61
Lightweight multi-hop routing protocol for resource optimisation in edge computing networks61
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers61
Two-stage Stackelberg game based physical reality sensing incentive mechanism in metaverse61
IoT-enabled coordination for recommerce circular supply chain in the industry 4.0 era60
Microservices based architectures for IoT systems - State-of-the-art review60
Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT59
Factories of the future in industry 5.0—Softwarization, Servitization, and Industrialization58
ISEE: A heterogeneous information system for event explainability in smart connected environments57
Efficient unmanned aerial vehicle-based data collection for IoT smart farming57
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT57
Bluetooth low energy indoor positioning: A fingerprinting neural network approach57
0.17857813835144