Internet of Things

Papers
(The median citation count of Internet of Things is 5. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2021-08-01 to 2025-08-01.)
ArticleCitations
A semantic communication model for the task of high quality image transmission to edge-end devices553
E-governance and the European Union: Agenda for implementation441
A real-time tennis level evaluation and strokes classification system based on the Internet of Things267
A cost-effective LoRaWAN-based IoT localization method using fixed reference nodes and dual-slope path-loss modeling205
A novel authentication protocol to ensure confidentiality among the Internet of Medical Things in covid-19 and future pandemic scenario169
TUI Model for data privacy assessment in IoT networks144
Trust-aware and incentive-based offloading scheme for secure multi-party computation in Internet of Things134
Self-adaptive and content-based scheduling for reducing idle listening and overhearing in securing quantum IoT sensors127
A WSN and vision based smart, energy efficient, scalable, and reliable parking surveillance system with optical verification at edge for resource constrained IoT devices125
Building structural analysis based Internet of Things network assisted earthquake detection117
Task offloading scheme of vehicular cloud edge computing based on Digital Twin and improved A3C112
Optimal data transmission for decentralized IoT and WSN based on Type-2 Fuzzy Harris Hawks Optimization110
Multifactor QoE scores in IoT topologies110
Empowering smart cities: High-altitude platforms based Mobile Edge Computing and Wireless Power Transfer for efficient IoT data processing106
Federated learning for performance behavior detection in a fog-IoT system100
Secure and Efficient Lightweight Authentication Protocol (SELAP) for multi-sector IoT applications99
Dfinder—An efficient differencing algorithm for incremental programming of constrained IoT devices99
CSFF-YOLOv5: Improved YOLOv5 based on channel split and feature fusion in femoral neck fracture detection99
SPOTTER: A novel asynchronous and independent WiFi and BLE fusion method based on particle filter for indoor positioning99
Proactive trust classification for detection of replication attacks in 6LoWPAN-based IoT94
A review of the security vulnerabilities and countermeasures in the Internet of Things solutions: A bright future for the Blockchain93
Constructing a Network Digital Twin through formal modeling: Tackling the virtual–real mapping challenge in IIoT networks86
IoT convergence with machine learning & blockchain: A review86
MDP-based connectivity and availability models for Internet of Vehicles84
Pixel tampering detection in encrypted surveillance videos on resource-constrained devices83
IoT-based supply chain management: A systematic literature review82
Securing IoT devices: A novel approach using blockchain and quantum cryptography82
An IoT-enabled omnidirectional mobile system for home-based rehabilitation of upper and lower limbs82
A cellular learning automata-based approach for self-protection and coverage problem in the Internet of Things80
Outlier detection in non-stationary time series applied to sewer network monitoring80
Autonomous driving test system under hybrid reality: The role of digital twin technology78
A formal approach to specify and verify Internet of Things architecture77
A flexible Compilation-as-a-Service and Remote-Programming-as-a-Service platform for IoT devices75
EVACUSCAPE: Internet of Things-enabled emergency evacuation based on matching theory74
Sensors as the Basis for Digitalization: New Approaches in Instrumentation, IoT-concepts, and 5G73
CONCERN: A model-based monitoring infrastructure73
An energy-focused model for batteryless IoT: Vortex wireless power transfer and fog computing in 6 G networks71
Deep learning-based transceiver design for multi-user MIMO systems70
Front matter 2 - Editorial board68
A secured blockchain method for multivariate industrial IoT-oriented infrastructure based on deep residual squeeze and excitation network with single candidate optimizer68
Enhancing real-time intrusion detection and secure key distribution using multi-model machine learning approach for mitigating confidentiality threats67
Algorithm and hardware co-design co-optimization framework for LSTM accelerator using quantized fully decomposed tensor train63
Anomaly-based Intrusion Detection System for smart lighting62
Capability token selection algorithms to implement lightweight protocols62
Lightweight multi-hop routing protocol for resource optimisation in edge computing networks61
LwHBench: A low-level hardware component benchmark and dataset for Single Board Computers61
Two-stage Stackelberg game based physical reality sensing incentive mechanism in metaverse61
SkinSense: Efficient vibration-based communications over human body using motion sensors61
A contactless method for recognition of daily living activities for older adults based on ambient assisted living technology61
Microservices based architectures for IoT systems - State-of-the-art review60
IoT-enabled coordination for recommerce circular supply chain in the industry 4.0 era60
Tiny keys hold big secrets: On efficiency of Pairing-Based Cryptography in IoT59
Factories of the future in industry 5.0—Softwarization, Servitization, and Industrialization58
ISEE: A heterogeneous information system for event explainability in smart connected environments57
Efficient unmanned aerial vehicle-based data collection for IoT smart farming57
A multi-objective mutation-based dynamic Harris Hawks optimization for botnet detection in IoT57
Bluetooth low energy indoor positioning: A fingerprinting neural network approach57
Formal verification and security analysis of FastDFS using process algebra56
Blockchain-based federated learning with homomorphic encryption for privacy-preserving healthcare data sharing56
CPPA-RORS: A conditional privacy-preserving authentication scheme based on revocable one-time ring signature for VANETs54
Greening smart learning environments with Artificial Intelligence of Things54
Semantic-driven dimension reduction for wireless internet of things52
Information Flow Control Based on Capability Token Validity for Secure IoT: Implementation and Evaluation51
MTAN: Multi-degree Tail-aware Attention Network for human motion prediction51
A GCN-LSTM framework for link prediction in dynamic SIoT networks51
“Hey Alexa, what do you know about the COVID-19 vaccine?”— (Mis)perceptions of mass immunization and voice assistants50
Enabling edge-driven Dataspace integration through convergence of distributed technologies48
ZFort: A scalable zero-trust approach for trust management and traffic engineering in SDN based IoTs48
An empirical investigation into the enhancement of decision-making capabilities in corporate sustainability leadership through Internet of Things (IoT) integration48
Edge deduplication for LoRaWAN using network coding47
Concept-drift-adaptive anomaly detector for marine sensor data streams47
Deep Image: A precious image based deep learning method for online malware detection in IoT environment47
In-vehicle edge system for real-time dashcam video analysis47
SPEChecker: Checking the feasibility of Slow-port-exhaustion attack on various hypervisors47
Farmland monitoring and livestock management based on internet of things47
D4GW: DTLS for gateway multiplexed application to secure MQTT(SN)-based pub/sub architecture46
IoT-powered personalization: creating the optimal shopping experience in digital twin VFRs46
Joint mode selection and resource allocation based on many-to-many reuse in D2D-aided IoT cellular networks46
Adaptive Single-layer Aggregation Framework for Energy-efficient and Privacy-preserving Load Forecasting in Heterogeneous Federated Smart Grids45
FedCLLM: Federated client selection assisted large language model utilizing domain description44
Image-based malware analysis for enhanced IoT security in smart cities44
A comprehensive soft security model for Cognitive Internet of Things44
ACS: Accuracy-based client selection mechanism for federated industrial IoT43
Joint wireless resource allocation and bitrate adaptation for QoE improvement in IRS-aided RSMA-enabled IoMT streaming systems42
nCare: Fault-aware edge intelligence for rendering viable sensor nodes42
A systematic approach for threat and vulnerability analysis of unmanned aerial vehicles41
An efficient authentication and key agreement scheme for security-aware unmanned aerial vehicles assisted data harvesting in Internet of Things41
Routing protocols in Vehicular Adhoc Networks (VANETs): A comprehensive survey40
Improving quality of service for Internet of Things(IoT) in real life application: A novel adaptation based Hybrid Evolutionary Algorithm40
Real-time Mixed Reality (MR) and Artificial Intelligence (AI) object recognition integration for digital twin in Industry 4.040
A review of digital object architecture and handle system: Development, current applications and prospective40
6G and intelligent healthcare: Taxonomy, technologies, open issues and future research directions39
Latency performance modelling in hyperledger fabric blockchain: Challenges and directions with an IoT perspective38
Smart platform based on IoT and WSN for monitoring and control of a greenhouse in the context of precision agriculture37
Corrigendum to ’A ZigBee intrusion detection system for IoT using secure and efficient data collection’ Internet of Things, Volume 12, December 2020, 100,30636
Over-the-air firmware update for IoT devices on the wild35
Memory-efficient and robust detection of Mirai botnet for future 6G-enabled IoT networks35
Two level blockchain-based privacy preservation framework in IoT with heuristic fusion mechanism-aided deep learning architecture35
A novel real-time data driven method for floating vehicle speed trend prediction35
System-wide IoT design and programming: Patterns for decentralised collective processes35
Joint uplink-downlink user-cell association for ultra-dense NOMA networks34
MicroFlow: An Efficient Rust-Based Inference Engine for TinyML34
AMI-Chain: A scalable power-metering blockchain with IPFS storage for smart cities34
EdgeBus: Co-Simulation based resource management for heterogeneous mobile edge computing environments34
Intelligent service placement algorithm based on DDQN and prioritized experience replay in IoT-Fog computing environment34
Evaluating computing performance of deep neural network models with different backbones on IoT-based edge and cloud platforms33
High-performance IoT Module for real-time control and self-diagnose PV panels under working daylight and dark electroluminescence conditions32
SHM-NDN: A seamless hybrid mobility management scheme for named data mobile ad hoc networks32
Memory feedback transformer based intrusion detection system for IoMT healthcare networks32
Fast ML-based next-word prediction for hybrid languages32
FogScheduler: A resource optimization framework for energy-efficient computing in fog environments32
Intent-based approaches for industry 4.0 applications: A systematic mapping study32
A multi-type artifact framework for cyber–physical, social systems design and development32
Implementation of multiple controllers for context-inspired collaboration between human and robot by integrating the uni-axial motion and real-time operating system32
Quantum cryptography as a solution for secure Wireless Sensor Networks: Roadmap, challenges and solutions32
Zero-knowledge machine learning models for blockchain peer-to-peer energy trading31
A privacy-preserving distributed energy management framework based on vertical federated learning-based smart data cleaning for smart home electricity data31
iRestroom : A smart restroom cyberinfrastructure for elderly people30
Federated learning with hyperparameter-based clustering for electrical load forecasting30
Commonsense reasoning and automatic generation of IoT contextual knowledge: An Answer Set Programming approach30
Proactive blockchain deployment mechanism in resource-constrained rate-splitting multiple access IoT networks30
An intelligent fuzzy-based system for handover decision in 5G-IoT networks considering network slicing and SDN technologies30
DeepVitals: Deep neural and IoT based vitals monitoring in smart teleconsultation system30
Improved YOLO-v5 model for boosting face mask recognition accuracy on heterogeneous IoT computing platforms30
Planning and resource allocation of a hybrid IoT network using artificial intelligence30
Programming IoT systems: A focused conceptual framework and survey of approaches30
Translating and verifying Cyber–Physical systems with shared-variable concurrency in SpaceEx29
i-DSME: An industrial-DSME MAC protocol for smart factory automation29
A deep learning model for natural language querying in Cyber–Physical Systems28
Enhancing security through continuous biometric authentication using wearable sensors28
DKSM: A Decentralized Kerberos Secure Service-Management Protocol for Internet of Things28
AIoT for sustainable manufacturing: Overview, challenges, and opportunities28
Deep Learning based Payload Optimization for Image Transmission over LoRa with HARQ28
Intelligent digital twin for federated learning in AIoT networks28
MULTI-BLOCK: A novel ML-based intrusion detection framework for SDN-enabled IoT networks using new pyramidal structure28
The role of IoT sensor in smart building context for indoor fire hazard scenario: A systematic review of interdisciplinary articles27
Data acquisition and monitoring system framed in Industrial Internet of Things for PEM hydrogen generators27
LoRaWAN-Based IoT System Implementation for Long-Range Outdoor Air Quality Monitoring27
Performance analysis of entropy variation-based detection of DDoS attacks in IoT27
Design of an IoT ultrasonic-vision based system for automatic fruit sorting utilizing size and color27
An optimized CNN-based intrusion detection system for reducing risks in smart farming27
The Interplay between the Internet of Things and agriculture: A bibliometric analysis and research agenda27
The Three-Phase Methodology for IoT Project Development27
Federated learning vulnerabilities, threats and defenses: A systematic review and future directions27
H-TERF: A hybrid approach combining fuzzy multi-criteria decision-making techniques and enhanced random forest to improve WBAN-IoT26
Optimizing parameters of YOLO model through uniform experimental design for gripping tasks performed by an internet of things–based robotic arm26
PRS-HDMC: An online participant recruitment scheme for vehicular crowdsensing-enabled HD map collection26
AIoT-enabled defect detection with minimal data: A few-shot learning approach combining prototypical and relational networks for smart manufacturing26
A Digital Twin (DT) approach to Narrow-Band Internet of Things (NB-IoT) wireless communication optimization in an industrial scenario25
Advanced security frameworks for UAV and IoT: A deep learning approach25
The AutoSPADA platform: User-friendly edge computing for distributed learning and data analytics in connected vehicles25
Multi-residual tensor completion for spatiotemporal data imputation25
An efficient methodology to composite fault detection and classification in wireless biosensor networks25
Joint coded caching and BS sleeping strategy to reduce energy consumption in 6G edge networks24
Revocation in attribute-based encryption for fog-enabled internet of things: A systematic survey24
Cooperative Swarm Learning for Distributed Cyclic Edge Intelligent Computing24
Enhancing lightweight authenticated key agreement with privacy protection using dynamic identities for Internet of Drones24
BTIA-IME: A blockchain-based trusted interactive architecture for intelligent manufacturing equipment24
IoT-based expert system for fault detection in Japanese Plum leaf-turgor pressure WSN24
Wireless Sensor Network coverage optimization based on Yin–Yang pigeon-inspired optimization algorithm for Internet of Things24
A robust IoT architecture for smart inverters in microgrids using hybrid deep learning and signal processing against adversarial attacks24
A framework for enhancing cyber incident response with Security-Enhancing Digital Twins in Cyber–Physical Systems24
Robotic Arms for Telemedicine System Using Smart Sensors and Ultrasound Robots23
Enhancing IoT security through emotion recognition and blockchain-driven intrusion prevention23
IoVT-based efficient solution for optimal active smart camera selection in a tracking mission23
Exploring the applicability of haptic actuators in aquatic environments23
A novel machine learning pipeline to detect malicious anomalies for the Internet of Things23
Forecasting energy power consumption using federated learning in edge computing devices23
MIMA 2.0 - Compact and portable Multifunctional IoT integrated Menstrual Aid23
Predicting container intermodal transport arrival times: An approach based on IoT data23
Collaboration of AI, big data, and blockchain in Internet of Things (IoT): Emerging trends and perspectives22
M2VT-IDS: A multi-task multi-view learning architecture for designing IoT intrusion detection system22
Location-based activity behavior deviation detection for nursing home using IoT devices22
Enhancing privacy and security in smart healthcare: A blockchain-powered decentralized data dissemination scheme22
Low complexity channel tracking algorithms for coordinated and uncoordinated pilot access over high-rate internet of things22
Missing data recovery based on temporal smoothness and time-varying similarity for wireless sensor network22
TinyML Meets IoT: A Comprehensive Survey22
QoS maximization scheduling of multiple UAV base stations in 3D environment21
A new road state information platform based on crowed sensing on challenged network environments21
A network communication speedup model using multiple fungible and non-fungible paths21
On the integration of Self-Sovereign Identity with TLS 1.3 handshake to build trust in IoT systems21
IoTDeploy: Deployment of IoT Smart Applications over the Computing Continuum21
Fog Node Self-Control Middleware: Enhancing context awareness towards autonomous decision making in Fog Colonies21
Distributed inference in IoT-based aerial network of UAVs21
The robust scheme for intrusion detection system in Internet of Things21
A Decentralized Trust Establishment Protocol for Smart IoT Systems21
Improve quality of service for the Internet of Things using Blockchain & machine learning algorithms20
Exploring machine learning methods for the identification of production cycles and anomaly detection20
Reassessing caching performance in information-centric IoT20
Application of navigation grid corner point algorithm in virtual reality simulation images of indoor fire evacuation20
Minimizing energy consumption in 802.15.4 IoT devices with multilevel xRPL (MxRPL)20
Dynamic cooperation and mutual feedback network for shield machine20
A generic flexible and scalable framework for hierarchical parallelization of population-based metaheuristics20
A systematic review of technologies and solutions to improve security and privacy protection of citizens in the smart city19
Enhancing AI transparency in IoT intrusion detection using explainable AI techniques19
Artificial intelligence for IoMT security: A review of intrusion detection systems, attacks, datasets and Cloud–Fog–Edge architectures19
The Internet of Autonomous Things applications: A taxonomy, technologies, and future directions19
A survey on security and cryptographic perspective of Industrial-Internet-of-Things19
Communication and computation efficiency in Federated Learning: A survey19
A survey of blockchain-based IoT eHealthcare: Applications, research issues, and challenges19
A survey on security in internet of things with a focus on the impact of emerging technologies19
An access control scheme in IoT-enabled Smart-Grid systems using blockchain and PUF19
PARSECS_RT: A real-time PARSECS-based communication protocol stack for critical sensing applications18
A Collaboration-centric Taxonomy of the Internet of Things: Implications for Awareness Support18
Data fusion integrated network forecasting scheme classifier (DFI-NFSC) via multi-layer perceptron decomposition architecture18
Hybrid FFBAT optimized multi-hop routing in Internet of Nano-Things18
Vortex Feature Positioning: Bridging tabular IIoT data and image-based deep learning18
Automatic software tailoring for Green Internet of Things18
Social relationships and location information based routing algorithm in opportunistic networks18
AI-based anomaly identification techniques for vehicles communication protocol systems: Comprehensive investigation, research opportunities and challenges18
Resource allocation for dataflow applications in FANETs using anypath routing18
A framework for creating an IoT system specification with ChatGPT18
The computing continuum: From IoT to the cloud18
Combinative model compression approach for enhancing 1D CNN efficiency for EIT-based Hand Gesture Recognition on IoT edge devices18
Relationship between resource scheduling and distributed learning in IoT edge computing — An insight into complementary aspects, existing research and future directions18
An IoT-based interoperable architecture for wireless biomonitoring of patients with sensor patches17
Farmer-centric design thinking principles for smart farming technologies17
SAFE: An ICT platform for supporting monitoring, localization and rescue operations in case of earthquake17
HAR: A stacked ensemble learning approach based on smartphone sensors for activity detection17
Adaptive multi-view subspace learning based on distributed optimization17
Intelligent authentication of 5G healthcare devices: A survey17
Matter and ECHONET Lite: Similarities, differences, and a bridge solution for interoperability17
Blockchain-enabled road vehicle emissions monitoring: A secure, scalable and private framework17
Comprehensive survey on reinforcement learning-based task offloading techniques in aerial edge computing17
Reducing communication overhead in the IoT–edge–cloud continuum: A survey on protocols and data reduction strategies17
An approach to assess robustness of MQTT-based IoT systems17
Algorithm for child adoption process using artificial intelligence and monitoring system for children17
Implementation and Calibration of an IoT Light Attenuation Turbidity Sensor17
IoTSLE: Securing IoT systems in low-light environments through finite automata, deep learning and DNA computing based image steganographic model17
Resilience of healthy cities in the post-pandemic era: Findings based on internet of things data and artificial intelligence algorithms17
Multicamera edge-computing system for persons indoor location and tracking17
IoT-driven augmented reality and virtual reality systems in neurological sciences17
Reliable PID dual-rate controller based on LoRaWAN for long-range distributed systems17
OpenAPI framework for the Web of Things17
A fault tolerance aware green IoT workflow scheduling algorithm for multi-dimensional resource utilization in sustainable cloud computing17
Secure IoT-enabled sharing of digital medical records: An integrated approach with reversible data hiding, symmetric cryptosystem, and IPFS17
Lightweight face recognition-based portable attendance system with liveness detection17
XG-BoT: An explainable deep graph neural network for botnet detection and forensics16
Empirical evaluation of feature selection methods for machine learning based intrusion detection in IoT scenarios16
Content placement using Cuckoo search in Cloud-based Content delivery networks16
IoFT-FIS: Internet of farm things based prediction for crop pest infestation using optimized fuzzy inference system16
A deep learning framework for target localization in error-prone environment16
IoT data dissemination scheme for reducing delay in multi-broker environments16
Time series processing-based malicious activity detection in SCADA systems16
Reinforcement learning-based drone-assisted collection system for infection samples in IoT environment16
A simulation system for decision of camera position and angle: Human motion analysis in case of dangerous posture scenarios16
Current testing and performance evaluation methodologies of LoRa and LoRaWAN in IoT applications: Classification, issues, and future directives16
IoT contributions to the safety of construction sites: A comprehensive review of recent advances, limitations, and suggestions for future directions16
Evaluation of BLE beacon technology for time critical I2V communication to support CAV deployment on urban roadways16
Unlocking the dynamic potential: Next-gen DOA estimation for moving signals via BSCS with adaptive weighted Kalman filter in 6G networks16
0.13724112510681